General

CISA: No Wider Federal Impact from Treasury Cyber Attack, Investigation Ongoing​

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday said there are no indications that the cyber attack targeting the Treasury Department impacted other federal agencies.
The agency said it’s working closely with the Treasury Department and BeyondTrust to get a better understanding of the breach and mitigate its impacts.
“The security of federal systems and the data they

CISA: No Wider Federal Impact from Treasury Cyber Attack, Investigation Ongoing​ Read Post »

Moxa Alerts Users to High-Severity Vulnerabilities in Cellular and Secure Routers​

Taiwan-based Moxa has warned of two security vulnerabilities impacting its cellular routers, secure routers, and network security appliances that could allow privilege escalation and command execution.
The list of vulnerabilities is as follows –

CVE-2024-9138 (CVSS 4.0 score: 8.6) – A hard-coded credentials vulnerability that could allow an authenticated user to escalate privileges and gain

Moxa Alerts Users to High-Severity Vulnerabilities in Cellular and Secure Routers​ Read Post »

Neglected Domains Used in Malspam to Evade SPF and DMARC Security Protections​

Cybersecurity researchers have found that bad actors are continuing to have success by spoofing sender email addresses as part of various malspam campaigns.
Faking the sender address of an email is widely seen as an attempt to make the digital missive more legitimate and get past security mechanisms that could otherwise flag it as malicious.
While there are safeguards such as DomainKeys

Neglected Domains Used in Malspam to Evade SPF and DMARC Security Protections​ Read Post »

Researchers Expose NonEuclid RAT Using UAC Bypass and AMSI Evasion Techniques​

Cybersecurity researchers have shed light on a new remote access trojan called NonEuclid that allows bad actors to remotely control compromised Windows systems.
“The NonEuclid remote access trojan (RAT), developed in C#, is a highly sophisticated malware offering unauthorised remote access with advanced evasion techniques,” Cyfirma said in a technical analysis published last week.
“It employs

Researchers Expose NonEuclid RAT Using UAC Bypass and AMSI Evasion Techniques​ Read Post »

Top 5 Malware Threats to Prepare Against in 2025​

2024 had its fair share of high-profile cyber attacks, with companies as big as Dell and TicketMaster falling victim to data breaches and other infrastructure compromises. In 2025, this trend will continue. So, to be prepared for any kind of malware attack, every organization needs to know its cyber enemy in advance. Here are 5 common malware families that you can start preparing to counter

Top 5 Malware Threats to Prepare Against in 2025​ Read Post »

Mirai Botnet Variant Exploits Four-Faith Router Vulnerability for DDoS Attacks​

A Mirai botnet variant has been found exploiting a newly disclosed security flaw impacting Four-Faith industrial routers since early November 2024 with the goal of conducting distributed denial-of-service (DDoS) attacks.
The botnet maintains approximately 15,000 daily active IP addresses, with the infections primarily scattered across China, Iran, Russia, Turkey, and the United States.

Mirai Botnet Variant Exploits Four-Faith Router Vulnerability for DDoS Attacks​ Read Post »

FCC Launches ‘Cyber Trust Mark’ for IoT Devices to Certify Security Compliance​

The U.S. government on Tuesday announced the launch of the U.S. Cyber Trust Mark, a new cybersecurity safety label for Internet-of-Things (IoT) consumer devices.
“IoT products can be susceptible to a range of security vulnerabilities,” the U.S. Federal Communications Commission (FCC) said. “Under this program, qualifying consumer smart products that meet robust cybersecurity standards will bear

FCC Launches ‘Cyber Trust Mark’ for IoT Devices to Certify Security Compliance​ Read Post »

Major Vulnerabilities Patched in SonicWall, Palo Alto Expedition, and Aviatrix Controllers​

Palo Alto Networks has released software patches to address several security flaws in its Expedition migration tool, including a high-severity bug that an authenticated attacker could exploit to access sensitive data.
“Multiple vulnerabilities in the Palo Alto Networks Expedition migration tool enable an attacker to read Expedition database contents and arbitrary files, as well as create and

Major Vulnerabilities Patched in SonicWall, Palo Alto Expedition, and Aviatrix Controllers​ Read Post »

New Banshee Stealer Variant Bypasses Antivirus with Apple’s XProtect-Inspired Encryption​

Cybersecurity researchers have uncovered a new, stealthier version of a macOS-focused information-stealing malware called Banshee Stealer.
“Once thought dormant after its source code leak in late 2024, this new iteration introduces advanced string encryption inspired by Apple’s XProtect,” Check Point Research said in a new analysis shared with The Hacker News. “This development allows it to

New Banshee Stealer Variant Bypasses Antivirus with Apple’s XProtect-Inspired Encryption​ Read Post »

Product Walkthrough: How Reco Discovers Shadow AI in SaaS​

As SaaS providers race to integrate AI into their product offerings to stay competitive and relevant, a new challenge has emerged in the world of AI: shadow AI. 
Shadow AI refers to the unauthorized use of AI tools and copilots at organizations. For example, a developer using ChatGPT to assist with writing code, a salesperson downloading an AI-powered meeting transcription tool, or a

Product Walkthrough: How Reco Discovers Shadow AI in SaaS​ Read Post »

Scroll to Top