Cybersecurity Threats | Malware Development | Vulnerability Exploitation Chinese cybercriminals are taking advantage of vulnerabilities in SharePoint to launch toolsets that include backdoors, ransomware, and loaders.
Cybersecurity Threats | Phishing and Social Engineering Techniques | Remote Monitoring and Management Exploitation Threat actors are exploiting Remote Monitoring and Management (RMM) tools to gain control of systems and extract sensitive information.
Cybersecurity Threats | Malware Distribution | Social Engineering Attacks Search results on Bing have been manipulated to distribute Bumblebee malware when users search for ‘ManageEngine OpManager’.
AI Infrastructure Vulnerabilities | Cybersecurity Threats | Malware Analysis The frequency of cyber attacks targeting AI infrastructure is increasing, with significant vulnerabilities being identified.
Credential Theft | Cybersecurity Threats | Phishing Campaign APT36 Hackers Targeting Indian Government Organizations to Harvest Login Information
Cybersecurity Threats | Malware Distribution | Supply Chain Attacks North Korean cybercriminals are exploiting NPM packages to pilfer cryptocurrency and confidential information.
Cybersecurity Threats | Mitigation Strategies | Vulnerability Management SonicWall has issued a warning about a rise in cyberattacks aimed at their Generation 7 firewalls over the past 72 hours.
Cybersecurity Threats | Remote Code Execution | Vulnerability Exploitation Cybercriminals have the ability to access IIS machine keys by taking advantage of a vulnerability in SharePoint’s deserialization process.
Cybersecurity Threats | Malware Distribution Techniques | Social Engineering Tactics Well-known Chollima APT hackers are targeting job applicants and organizations to distribute JavaScript-based malware.
Cybersecurity Threats | E-commerce Fraud | Phishing and Malware Campaigns A campaign utilizing artificial intelligence has created 15,000 counterfeit TikTok Shop websites that distribute malware and steal cryptocurrency.
Cybersecurity Threats | Ransomware Attacks | Vulnerability Investigation SonicWall is looking into a possible zero-day vulnerability in its SSL VPN following reports of over 20 targeted attacks.
Cybersecurity Threats | Malicious Software Techniques | Supply Chain Vulnerabilities Malicious actors are currently taking advantage of weaknesses in the open-source ecosystem to distribute harmful software.
Cybersecurity Threats | Incident Response Challenges | Ransomware Tactics A ransomware assault targeting a phone repair and insurance firm resulted in damages totaling millions.
Cybersecurity Threats | Ransomware Attacks | Vulnerability Exploitation SonicWall VPNs are being actively targeted due to a zero-day vulnerability that allows attackers to circumvent multi-factor authentication (MFA) and install ransomware.
Cybersecurity Threats | Malware Delivery Techniques | Remote Access Tools A recent malware attack is utilizing LNK files to deploy the REMCOS backdoor on Windows systems.
Cybersecurity Threats | Malware Exploitation Techniques | Military Industrial Espionage CNCERT has alleged that U.S. intelligence agencies are targeting Chinese military-industrial entities.
Cybersecurity Threats | Man-in-the-Middle Attacks | Network Vulnerabilities Guide for Preventing Man-in-the-Middle Attacks