Researchers have uncovered a sophisticated phishing marketplace, the ONNX Store, which provides cybercriminals with advanced tools to hijack Microsoft 365 accounts. Alarmingly, these tools include methods for bypassing two-factor authentication
Uncategorized
Criminal IP and Maltego Collaborate to Broaden Threat Intelligence Data Search
Criminal IP, an expanding Cyber Threat Intelligence (CTI) search engine from AI SPERA, has recently completed its technology integration with Maltego, a global all-in-one investigation platform that specializes in visualized
Best Active Directory Monitoring Tools – 2024
Monitoring an Active Directory (AD) involves tracking and analyzing business AD events and activity. Windows-based systems store and manage network resources, user accounts, groups, and security rules in Active Directory.
Critical OpenVPN Vulnerabilities Expose Millions of Devices to RCE Attack
Microsoft researchers have recently uncovered multiple medium-severity vulnerabilities in OpenVPN, a widely used open-source VPN software. OpenVPN is used by thousands of companies across various industries, including information technology, financial
Microsoft Office Spoofing Vulnerability Let Attackers Steal Sensitive Data
Microsoft has disclosed a significant security vulnerability in its Office suite, identified as CVE-2024-38200, which could potentially allow attackers to access sensitive information. This spoofing vulnerability affects multiple versions of
Open Source Firewall pfsense Vulnerable to Remote Code Execution Attacks
A popular open-source firewall software pfSense vulnerability has been identified, allowing for remote code execution (RCE) attacks. The vulnerability, tracked as CVE-2022-31814, highlights potential risks in pfSense installations, particularly those
Thousands Of Internet-Connected ICS Devices Exposes Critical Infrastructure To Cyber Attacks
In November 2023, hackers from Iran hacked the Municipal Water Authority of Aliquippa, Pennsylvania. They targeted a vulnerable control system and damaged it with anti-Israel statements. Two months later, in
Series Of Solar Power System Vulnerabilities Impacts Millions Of Installations
The giant global electricity network intercrosses the fast-growing solar power infrastructure and ubiquitous Internet of Things, making a complex point of energy and data. This intersection relies on vulnerable inverters
5 Malware Analysis Challenges Solved by an Interactive Sandbox
Malware analysis can be challenging, as it often requires in-depth theoretical knowledge and advanced skills. Tools like an interactive sandbox help simplify it, making sophisticated malware behavior easy to expose