CISA Warning Against Active Exploitation of Palo Alto Networks’ PAN-OS Vulnerability

This image is about CISA's warning regarding the active exploitation of a Palo Alto Networks PAN-OS vulnerability.

Blog CISA added Palo Alto Networks PAN-OS to its Catalog of Known Exploited Vulnerabilities based on evidence of active exploitation This critical vulnerability is tracked with code CVE-2022-0028 (CVSS: 8.6 High). The vulnerability is the misconfiguration of a URL filtering policy. Misconfiguration of the PAN-OS URL filtering policy could allow a network-based attacker to perform […]

Iranian Threat Actor MERCURY Exploits Log4j 2 Vulnerabilities in Unpatched Systems

This image is about MERCURY exploiting Log4j 2 vulnerabilities.

Blog The Microsoft Threat Intelligence Center (MSTIC) and Microsoft 365 Defender Research Team found that Iran-based threat actor MERCURY exploited Log4j 2 vulnerabilities in SysAid applications. The threat actor targets organizations that are all based in Israel. After gaining access, MERCURY maintains persistence, flushes credentials, and moves laterally within the targeted organization using both proprietary […]

LastPass Password Manager with 25 Million Users Hacked

This image is about the LastPass password manager breach affecting 25 million users.

Blog LastPass, one of the world’s largest password managers, has confirmed that it has been hacked. The company revealed that threat actors stole some of the company’s source code and some proprietary LastPass technical information. It was also stated that there is no evidence yet that this incident involved any access to customer data or […]

Chinese Threat Actors APT40 Targets Energy Sector in Australia and the South China Sea

This image is about APT40 targeting the energy sector in Australia and the South China Sea.

Blog The Chinese state-owned threat actor, APT40, targets Australian government agencies, Australian media companies and manufacturers that maintain wind turbine fleets in the South China Sea. Cybersecurity firm Proofpoint, which works in collaboration with PwC, said the threat actor sent phishing emails impersonating the latest campaigns, fake Australian Morning News and Australian media outlets. The […]

The Importance of Attack Surface Management for Organizations

This image is about the importance of attack surface management for organizations.

Blog The Importance of Attack Surface Management for Organizations Today, with the transition of organizations from traditional business processes to digital business processes, the likelihood of organizations facing the risk of cyber attacks on their digital assets is increasing. This situation brings with it the need for continuous management and monitoring of digital assets. Although […]

Akira: Undetectable Stealer Unleashed

This image is about Akira, an undetectable stealer.

Blog Introduction A new Stealer named Akira has been put up for sale on Telegram. It has the following features: Password grabber Cookies grabber Bookmarks grabber Crypto wallets and 2fa extensions dump (Grabs 💸 Zcash, 🚀 Armory, 📀 Bytecoin, 💵 Jaxx, 💎 Exodus desktop/extension, 📉 Ethereum, 🔨 Electrum, 🕹 AtomicWallet, 💹 Guarda, ⚡️ Coinbase, 🦊 […]

ChatGPT and Malware Analysis – ThreatMon

This image is about ChatGPT and malware analysis.

Blog What is ChatGPT? ChatGPT is an AI driven chatbot launched by OpenAI in November 2022. ChatGPT is a variant of the GPT (Generative Pre-training Transformer) language model that has been fine-tuned for the task of conversational response generation. Like other GPT models, ChatGPT uses a transformer architecture to process and generate text. However, it […]

TA558 APT Group Uses Malicious Microsoft Compiled HTML Help Files

This image is about TA558 APT group using malicious Microsoft Compiled HTML Help files.

Blog Who is TA558? TA558, a financially-motivated cybercrime group, has been targeting the hospitality, travel, and related industries located in Latin America, North America, and Western Europe since 2018. The group sends malicious emails in Portuguese, Spanish, and sometimes English, using lures related to reservations and business themes such as hotel bookings. The emails may […]

ChatGPT and Cyber Security in 15 Questions: Impacts, Benefits and Harms

This image is about ChatGPT and cybersecurity in 15 questions.

Blog What is the ChatGPT? ChatGPT is an AI driven chatbot launched by OpenAI in November 2022. ChatGPT is a variant of the GPT (Generative Pre-training Transformer) language model that has been fine-tuned for the task of conversational response generation. Like other GPT models, ChatGPT uses a transformer architecture to process and generate text. However, […]