Written by AJ Vicens Apr 11, 2022 | CYBERSCOOP Federal prosecutors working the insider trading and hacking case against a Russian millionaire extradited to the U.S. in December inadvertently gave…
Day: April 11, 2022
XSS vulnerability patched in Directus data engine platform
A cross-site scripting (XSS) vulnerability has been patched in the popular Directus engine. Directus is an open source, modular content management system (CMS) promoted as a “flexible powerhouse for engineers.”…
Octo Android Malware Can Take Over Your Device
Octo, a recently discovered Android banking trojan with remote access capabilities that allows cybercriminals to commit on-device fraud, has been observed in the wild. Octo was discovered by ThreatFabric security…
IRQLs Close Encounters of the Rootkit Kind
IRQL Overview Present since the early stages of Windows NT, an Interrupt Request Level (IRQL) defines the current hardware priority at which a CPU runs at any given time. On…
Spring4Shell flaw is now being used to spread this botnet malware
Security researchers have observed attackers exploiting the Spring4Shell Java-related flaw to install malware on target systems. Researchers at security firms Trend Micro and Qihoo 360 watched the attacks emerge…
Conti’s Leaked Ransomware Used to Target Russian Businesses
Conti’s source code was exposed after the company allied with Russia in the Ukraine conflict, and a security researcher obtained 170,000 internal chat messages as well as the source code…
Why you might consider working with an MSP to obtain cyber insurance
Cyber insurance is quickly becoming one of the most essential cybersecurity services available to an organization. Unlike traditional services that offer defense, proactive threat hunting, or reactive remediation, cyber insurance…
New Meta Malware Used in Malspam Campaign
A new META malware, an info-stealer that seems to be more and more popular among hackers, has been discovered being leveraged by threat actors in a recent malspam campaign. What…
Fraudsters Steal £58m in 2021 Via Remote Access Tools
Victims often receive an unsolicited call first