Zip Slip Vulnerability Let Attacker Import Malicious Code and Execute Arbitrary Code

A critical Zip Slip vulnerability was discovered in the open-source data cleaning and transformation tool ‘OpenRefine’, which allowed attackers to import malicious code and execute arbitrary code. OpenRefine is a strong Java-based, free, open-source tool for handling messy data. This includes cleaning it, converting it into a different format, and expanding it with web services and external data. According to SonarCloud, […]

Continue Reading

LightSpy APT Attacking WeChat Users to Steal Payment Data

LightSpy malware, responsible for a watering hole attack conducted against iOS users in Hong Kong, has been discovered to be embedded with Android implant Core and its 14 related plugins from 20 active servers for attacking mobile users. LightSpy is a Mobile Advanced Persistent Threat (mAPT) that uses new and sophisticated techniques to attack mobile […]

Continue Reading

Lazarus Tricking Employees with Trojanized Coding Challenges

Lazarus group has been recently discovered to have targeted an Aerospace company in Spain, which involved deploying several tools, including an undocumented backdoor named “LightlessCan.” Reports indicate that the threat actor gained access to the organization’s network last year using a spearphishing campaign impersonating a recruiter from Meta. The threat group contacted one of the […]

Continue Reading

Hackers Bypass Cloudflare Firewall, and DDoS Protections using Cloudflare

Cloudflare, a prominent cybersecurity vendor renowned for its web protection services, faces a security challenge that could expose its customers to unforeseen risks.  A recent disclosure from Certitude highlights a vulnerability that could allow attackers to bypass certain protection mechanisms offered by Cloudflare, leaving customers susceptible to attacks that the platform is designed to prevent. […]

Continue Reading

MadPot: AWS Honeypot to Disrupt Threat Actors

In the realm of cybersecurity, the battle against threat actors never stops. With its vast cloud infrastructure, Amazon Web Services (AWS) is at the forefront of this ongoing struggle.  AWS employs a global network of sensors and advanced disruption tools daily to detect and thwart hundreds of cyberattacks.  These relentless efforts remain largely unseen but […]

Continue Reading

APT34 Employs Weaponized Word Documents to Deploy New Malware Strain

APT34 is a secretive cyberespionage group specializing in Middle East targets, known for gathering sensitive intelligence via spear phishing and advanced infiltration methods. The sophistication and comprehensive resources of the APT34 group pose a major regional and global cybersecurity threat.  They have conducted high-profile cyberattacks in the Middle East against diverse targets:- Cybersecurity researchers at […]

Continue Reading

Budworm APT Attacking Telecoms Org With New Custom Tools

APT (Advanced Persistent Threat) actors are evolving at a rapid pace, continually enhancing their toolsets and tactics.  They adapt quickly to security measures, leveraging advanced techniques, such as zero-day exploits, to remain undetected. Their ability to innovate and collaborate in the underground cybercriminal ecosystem makes tracking and countering APT threats an ongoing challenge for cybersecurity […]

Continue Reading

Cisco IOS Software Zero-day Exploited in Attacks

Cisco has issued fixes to address a vulnerability in the GET VPN feature of IOS and IOS XE software that has been exploited in attacks. A remote attacker who has administrative access to a group member or a key server can exploit this vulnerability to run arbitrary code or bring down an affected device. Cisco […]

Continue Reading