XZ Utils Supply Chain Attack: A Threat Actor Spent Two Years to Implement a Linux Backdoor

Read about a supply chain attack that involves XZ Utils, a data compressor widely used in Linux systems, and learn how to protect from this threat. Continue reading XZ Utils Supply Chain Attack: A Threat Actor Spent Two Years to Implement a Linux Backdoor

New GoFetch Vulnerability in Apple’s M Chips Allows Secret Keys Leak on Compromised Computers

The GoFetch vulnerability, which affects Apple’s M series of chips, allows an attacker to steal secret keys from the Mac under certain conditions. Read tips on mitigating the GoFetch security threat. Continue reading New GoFetch Vulnerability in Apple’s M Chips Allows Secret Keys Leak on Compromised Computers

New Vulnerabilities in ConnectWise ScreenConnect Massively Exploited by Attackers

One vulnerability impacting ConnectWise ScreenConnect that allows remote attackers to bypass authentication to create admin accounts is being used in the wild. Continue reading New Vulnerabilities in ConnectWise ScreenConnect Massively Exploited by Attackers

Google Threat Analysis Group’s Spyware Research: How CSVs Target Devices and Applications

Read more about the commercial surveillance vendors threat and its ecosystem and learn how to protect from it. Continue reading Google Threat Analysis Group’s Spyware Research: How CSVs Target Devices and Applications

Ransomware’s Impact Could Include Heart Attacks, Strokes & PTSD

New research details the possible effects of ransomware attacks on businesses and staff, society, the economy and national security, highlighting that its impact on mental and physical health is often overlooked. Continue reading Ransomware’s Impact Could Include Heart Attacks, Strokes & PTSD

Androxgh0st Malware Botnet Steals AWS, Microsoft Credentials and More

The Androxgh0st malware botnet is used for victim identification and exploitation in targeted networks, as well as credentials collection. Read the FBI/CISA’s tips for protecting against this malware threat. Continue reading Androxgh0st Malware Botnet Steals AWS, Microsoft Credentials and More

New Ivanti Secure VPN Zero-Day Vulnerabilities and Patches

Read details about the new Ivanti VPN zero-day vulnerabilities, along with the latest information about patches. Most of the exposed VPN appliances are reported to be in the U.S., followed by Japan and Germany. Continue reading New Ivanti Secure VPN Zero-Day Vulnerabilities and Patches

ESET Threat Report: ChatGPT Name Abuses, Lumma Stealer Malware Increases, Android SpinOk SDK Spyware’s Prevalence

Risk mitigation tips are provided for each of these cybersecurity threats. Continue reading ESET Threat Report: ChatGPT Name Abuses, Lumma Stealer Malware Increases, Android SpinOk SDK Spyware’s Prevalence

Proofpoint Exposes Sophisticated Social Engineering Attack on Recruiters That Infects Their Computers With Malware

Recruiters and anyone else involved in hiring processes should be knowledgeable about this social engineering attack threat. Continue reading Proofpoint Exposes Sophisticated Social Engineering Attack on Recruiters That Infects Their Computers With Malware