CISA Warning Against Active Exploitation of Palo Alto Networks’ PAN-OS Vulnerability

Blog This blog is about CISA’s warning regarding the active exploitation of a Palo Alto Networks PAN-OS vulnerability. PAN-OS vulnerability. CISA added Palo Alto Networks PAN-OS to its Catalog of Known Exploited Vulnerabilities based on evidence of active exploitation This critical vulnerability is tracked with code CVE-2022-0028 (CVSS: 8.6 High). The vulnerability is the misconfiguration […]
Iranian Threat Actor MERCURY Exploits Log4j 2 Vulnerabilities in Unpatched Systems

Blog The Iranian threat actor MERCURY has been exploiting unpatched Log4j 2 vulnerabilities in SysAid applications to target organizations, highlighting the critical need for timely security updates. The Iranian threat actor MERCURY The Microsoft Threat Intelligence Center (MSTIC) and Microsoft 365 Defender Research Team found that Iran-based threat actor MERCURY exploited Log4j 2 vulnerabilities in […]
LastPass Password Manager with 25 Million Users Hacked

Blog LastPass Password Manager Hacked, compromising encrypted password vaults and personal information of its 25 million users. LastPass Password Manager Hacked LastPass, one of the world’s largest password managers, has confirmed that it has been hacked. The company revealed that threat actors stole some of the company’s source code and some proprietary LastPass technical information. […]
The fake ‘Internet Download Manager’ Chrome Extension Has Been Downloaded Over 200,000 Times

Blog The fake ‘Internet Download Manager’ Chrome extension, masquerading as a legitimate tool, has been downloaded over 200,000 times. The fake Chrome extension The adware ‘Internet Download Manager’ Google Chrome extension has been installed by more than 200,000 users. According to reviews, this extension has been on the Chrome Web Store since June 2019. The […]
Chinese Threat Actors APT40 Targets Energy Sector in Australia and the South China Sea

Blog APT40, a Chinese state-sponsored hacking group, targets Energy Sector in Australia and the South China Sea. Chinese Threat Actors APT40 The Chinese state-owned threat actor, APT40, targets Australian government agencies, Australian media companies and manufacturers that maintain wind turbine fleets in the South China Sea. Cybersecurity firm Proofpoint, which works in collaboration with PwC, […]
The Importance of Attack Surface Management for Organizations

Blog Understand why attack surface management is crucial for organizations, focusing on how it helps identify, monitor, and secure exposed assets to mitigate potential cyber threats. The Importance of Attack Surface Management for Organizations Today, with the transition of organizations from traditional business processes to digital business processes, the likelihood of organizations facing the risk […]
Akira: Undetectable Stealer Unleashed

Blog Introduction A new Stealer named Akira has been put up for sale on Telegram. It has the following features: Password grabber Cookies grabber Bookmarks grabber Crypto wallets and 2fa extensions dump (Grabs 💸 Zcash, 🚀 Armory, 📀 Bytecoin, 💵 Jaxx, 💎 Exodus desktop/extension, 📉 Ethereum, 🔨 Electrum, 🕹 AtomicWallet, 💹 Guarda, ⚡️ Coinbase, 🦊 […]
ChatGPT and Malware Analysis – ThreatMon

Blog Explore how ChatGPT can assist in malware analysis by generating human-like responses, analyzing code and providing insights into malicious behaviors. What is ChatGPT? ChatGPT is an AI driven chatbot launched by OpenAI in November 2022. ChatGPT is a variant of the GPT (Generative Pre-training Transformer) language model that has been fine-tuned for the task […]
TA558 APT Group Uses Malicious Microsoft Compiled HTML Help Files

Blog The TA558 APT advanced persistent threat group has been observed utilizing malicious Microsoft Compiled HTML Help (.chm) files to deliver malware payloads, targeting sectors such as hospitality and travel. Who is TA558 APT? TA558, a financially-motivated cybercrime group, has been targeting the hospitality, travel, and related industries located in Latin America, North America, and […]
ChatGPT and Cyber Security in 15 Questions: Impacts, Benefits and Harms

Blog ChatGPT and Cyber Security: Discover the impacts, benefits, and potential harms of using ChatGPT in cybersecurity. What is the ChatGPT? ChatGPT is an AI driven chatbot launched by OpenAI in November 2022. ChatGPT is a variant of the GPT (Generative Pre-training Transformer) language model that has been fine-tuned for the task of conversational response […]