CVE-2023-46604 (Apache ActiveMQ) Exploited to Infect Systems With Cryptominers and Rootkits

Credit to Author: Peter Girnus| Date: Mon, 20 Nov 2023 00:00:00 +0000

We uncovered the active exploitation of the Apache ActiveMQ vulnerability CVE-2023-46604 to download and infect Linux systems with the Kinsing malware (also known as h2miner) and cryptocurrency miner.

Read more

ALPHV/BlackCat Take Extortion Public

Credit to Author: Jon Clay| Date: Fri, 17 Nov 2023 00:00:00 +0000

Learn more about ALPHV filing a complaint with the Security and Exchange Commission (SEC) against their victim, which appears to be an attempt to influence MeridianLink to pay the ransom sooner than later.

Read more

100 Quarters of Profitability: Insights from a Trender

Credit to Author: Jon Clay| Date: Tue, 14 Nov 2023 00:00:00 +0000

Learn what 100 straight quarters of profitability means to a Trender who has been here for every one of them.

Read more

Cerber Ransomware Exploits Atlassian Confluence Vulnerability CVE-2023-22518

Credit to Author: Sophia Nilette Robles| Date: Fri, 10 Nov 2023 00:00:00 +0000

We encountered the Cerber ransomware exploiting the Atlassian Confluence vulnerability CVE-2023-22518 in its operations.

Read more

Threat Actors Leverage File-Sharing Service and Reverse Proxies for Credential Harvesting

Credit to Author: Buddy Tancio| Date: Thu, 09 Nov 2023 00:00:00 +0000

We analyzed a phishing campaign involving malicious emails containing a link to a file-sharing solution, which further leads to a PDF document with a secondary link designed to steal login info and session cookies.

Read more

Implementing Zero Trust: 5 Key Considerations

Credit to Author: Alifiya Sadikali| Date: Tue, 07 Nov 2023 00:00:00 +0000

When implementing a Zero Trust strategy and selecting a solution to safeguard your company against cyber risk, there are many factors to consider. Five key areas include Visibility and Analytics, Automation and Orchestration, Central Management, Analyst Experience, and Pricing Flexibility and Transparency.

Read more

Securing Cloud Infrastructure Demands a New Mindset

Credit to Author: Pawan Kinger| Date: Tue, 31 Oct 2023 00:00:00 +0000

Rising attacks on cloud infrastructure and services have created a ‘shared fate’ scenario for cloud providers and users, where a successful breach means everybody loses. Fresh thinking and closer collaboration can help avoid that outcome and better protect public cloud resources.

Read more

How Kopeechka, an Automated Social Media Accounts Creation Service, Can Facilitate Cybercrime

Credit to Author: Cedric Pernet| Date: Fri, 27 Oct 2023 00:00:00 +0000

This report explores the Kopeechka service and gives a detailed technical analysis of the service’s features and capabilities and how it can help cybercriminals to achieve their goals.

Read more