BLOGS & HACKS


Microsoft has launched an aggressive crackdown on Storm-1152, a group offering “cybercrime-as-a-service,”

Microsoft has launched an aggressive crackdown on Storm-1152, a group offering “cybercrime-as-a-service,” taking significant legal actions to dismantle its network. This initiative includes seizing the group’s infrastructure in the US, shutting down critical websites, and conducting thorough investigations to identify ...
Read more

US Senators Introduce Bill to Strengthen Agriculture Cybersecurity

A bipartisan bill put forth by two US Senators seeks to enhance the cybersecurity measures within the food and agriculture sector, potentially resulting in the enactment of the Farm and Food Cybersecurity Act. The primary objective of this proposed legislation ...
Read more

A Command Injection Vulnerability Exposes Google’s Bazel to Security Threats

Recently, security researchers have identified a supply-chain vulnerability present in Bazel, one of Google’s key open-source projects. This vulnerability revolves around a command injection flaw found in a GitHub Actions workflow that Bazel depends on, potentially enabling malicious actors to ...
Read more

APT28, A RUSSIA-AFFILIATED GROUP, UTILIZING OUTLOOK VULNERABILITY TO SEIZE MS EXCHANGE ACCOUNTS

Microsoft’s Threat Intelligence has issued a warning regarding the active exploitation of the CVE-2023-23397 Outlook flaw by the Russia-associated APT28 group to seize control of Microsoft Exchange accounts. The APT28 group, also known as “Forest Blizzard,” “Fancybear,” or “Strontium,” has ...
Read more

Operation Triangulation Attacks Exploited an Undocumented Hardware Feature

A discovery by experts has revealed that Operation Triangulation, which targets Apple iOS devices, made use of an undocumented hardware feature. Researchers from Kaspersky, a Russian cybersecurity firm, uncovered that the perpetrators behind Operation Triangulation capitalized on an undocumented hardware ...
Read more

Non-Repudiation: Safeguarding Your Cyber Realm

In the expansive digital domain, where interactions are abundant and diverse, discerning the origins and authenticity of these interactions poses considerable challenges. This is precisely where the concept of non-repudiation becomes invaluable. By amalgamating various security facets such as delivery ...
Read more

Dicovering the Evolving Landscape of AI-Driven Phishing Attacks

The rapid evolution of Artificial Intelligence (AI) is reshaping not just the technological realm but various facets of human endeavors at an unprecedented pace. However, alongside the benefits of technological progress, there exists a darker side where AI is harnessed ...
Read more

Exploring the Unseen Dangers of Software Supply Chains: A Comprehensive Examination

In an era where organizations increasingly rely on open-source components as fundamental building blocks in their application infrastructure, traditional Software Composition Analysis (SCA) tools fall short of providing complete protection against open-source threats. While leveraging open-source libraries can streamline coding ...
Read more

A newly uncovered vulnerability in the GNU C library (glibc) puts major Linux distributions at risk

A newly uncovered vulnerability in the GNU C library (glibc) puts major Linux distributions at risk, potentially allowing local attackers to gain root access on affected systems. Dubbed CVE-2023-6246 and carrying a CVSS score of 7.8, this heap-based buffer overflow ...
Read more

AI, Gaming, and FinTech Emerge as Key Cybersecurity Threats for Children in 2024

A recently released report by Kaspersky identifies AI tools, gaming vulnerabilities, and the growth of FinTech as major cybersecurity threats facing children in 2024. The report also underscores concerns related to the increasing popularity of smart home devices and the ...
Read more