A critical security flaw in Microsoft Bookings has been uncovered. This flaw, inherent in the default configuration of Microsoft Bookings, potentially allows attackers to create unauthorized Entra (formerly Azure AD)
All posts by admin
Hackers Exploiting Veeam RCE Flaw to Deploy New Frag Ransomware
Threat actors are actively exploiting a critical vulnerability in Veeam Backup & Replication software to deploy a new ransomware strain called “Frag.” The vulnerability, tracked as CVE-2024-40711, allows unauthenticated remote
Hackers Attacking macOS Users with New Multi-Stage Malware
North Korean threat actors, likely associated with BlueNoroff, have launched multi-stage malware attacks targeting cryptocurrency businesses, expanding their toolkit to include RustDoor/ThiefBucket and RustBucket campaigns. Hidden Risk, a DPRK-linked threat
Beware of Fake Copyright Claims that Deliver Rhadamanthys Stealer Malware
Cybercriminals have launched a large-scale phishing attack using a new variant of Rhadamanthys Stealer, dubbed CopyRh(ight)adamantys, which targets individuals and organizations worldwide, falsely accusing them of copyright infringement. Attackers impersonate
North Korean Hackers Abuse Cloud-Based Services to Deploy Malware
ESET’s recent report details the activities of various advanced persistent threat (APT) groups from April to September 2024, highlighting key trends and developments observed during this period, including the use
Beware of Fake Copyright Claims That Deliver Rhadamanthys Stealer
Stealer malware is a type of malicious software designed to infiltrate computers and extract sensitive information. Once installed, it communicates with a command-and-control server operated by threat actors and enables
Threat Actors Attacking macOS Users With New Multi-stage Malware
Multi-stage malware means sophisticated cyberattack strategies that evolve in several steps. Recent developments in multi-stage malware highlight the increasing sophistication of cyber threats. SentinelOne researchers recently discovered that threat actors
Hackers Can Hijack Your MFA Enabled Email Accounts By Stealing Cookies
MFA enhances the security of email accounts by requiring users to provide additional verification beyond just their password. Implementing MFA reduces the risk of unauthorized access which makes it a
Hackers Use ZIP File Concatenation Tactic to Launch Undetected Attacks on Windows Users
Cybercriminals are utilizing a sophisticated evasion strategy called ZIP file concatenation to specifically target Windows users. This method combines several ZIP files into a single archive, making it harder for
Cisco Industrial Wireless Software Flaw Let Attackers Run Command As Root User
Hackers target Cisco primarily due to its critical role in global network infrastructure and security. Cisco’s devices are essential for protecting sensitive data and communications which makes them attractive targets