U.S. Cyber Command Warns of Active Mass Exploitation Attempts Targeting Confluence Flaws

The cybersecurity authorities of the U.S. Cyber command have recently been notified regarding the increase in the number of scans and attempts to exploit a newly identified vulnerability in corporate servers along with the Atlassian Confluence wiki engine installed. CVE-2021-26084 in Confluence Server and Confluence Data Center software is the vulnerability that has been confirmed […]

Continue Reading

New Malware Family Using CLFS Log Files To Evade Detection

Cybersecurity researchers of FireEye’s Mandiant Advanced Practices team have revealed all the details regarding a new malware family that they have detected recently.  This malware depends on the Common Log File System (CLFS) to cover a second-stage payload in registry transaction files so that they can easily evade detection mechanisms. The security experts from FireEye […]

Continue Reading

WhatsApp Image Filter Bug Let Hackers Steal Sensitive Data

The cybersecurity researchers of Check Point Software Technologies Ltd have recently detected a security vulnerability in the image filtering function of WhatsApp, the world’s most famous messaging application that has active users more than 2 billion. The news gets disclosed an hour after knowing that WhatsApp will have to pay 225 million dollars for not […]

Continue Reading

Hackers Abuse Internet-sharing Services to Monetize their Own Malware Campaigns

Recently, it has been reported that the threat actors are discovering new methods to monetize their attacks by exploiting internet-sharing services, or “proxyware” platforms like Honeygain, Nanowire, and many others. Monetizing their own malware campaigns has brought unusual challenges to different organizations, particularly to those whose internet access is considered private.  However, we cant say […]

Continue Reading