Microsoft’s August Patch Tuesday Addresses Active Zero-Day Exploits
Threat Level Vulnerability Report For a detailed threat advisory, download the pdf file here Summary In the August Patch Tuesday release, Microsoft addressed a total of 73 CVEs, encompassing six critical and 67 important vulnerabilities. Within this range of vulnerabilities, the security update covered the typical …
Reptile Rootkit Targets Linux Systems in South Korea
Threat Level Attack Report For a detailed threat advisory, download the pdf file here Summary Reptile, an open-source Linux rootkit, goes beyond concealment, offering attackers a reverse shell and utilizing Port Knocking for control; observed in attacks including Chinese groups exploiting zero-days. Similarities to Mélofée malware …
Turla Updates KAZUAR Backdoor to Target Ukraine’s Defense Sector
Threat Level Attack Report For a detailed threat advisory, download the pdf file here Summary Turla’s Kazuar variant remains a persistent threat, accompanied by a new .NET-based backdoor, DeliveryCheck, attributed to Russian actor Turla. The attacks target Ukraine’s defense sector, utilizing tactics like PowerShell DSC and …
Kanti Ransomware Strikes Cryptocurrency Users
Threat Level Attack Report For a detailed threat advisory, download the pdf file here Summary Kanti is a novel strain of ransomware that has been specifically designed to target cryptocurrency users. This sophisticated ransomware is cunningly crafted to infiltrate systems and encrypt files, particularly those related …
A Deep Dive into Space Pirates’ Unconventional Cyber Arsenal
Threat Level Actor Report For a detailed threat advisory, download the pdf file here Summary Space Pirates have been a persistent digital threat since 2017, relentlessly targeting over 16 organizations in Russia and one in Serbia. Despite retaining its core methods, this infamous group continuously evolves, …
A New Cross-Platform ‘P2PInfect’ Worm Threatening Cloud Environments
Threat Level Attack Report For a detailed threat advisory, download the pdf file here Summary P2PInfect, a new cross-platform worm written in Rust, targets vulnerable Redis instances in cloud environments via the CVE-2022-0543 vulnerability, potentially posing a significant threat to over 307,000 systems. To receive real-time …
Hive Pro Announces Relocation and Expansion of Headquarters to Support Growing Cybersecurity Demand
New Headquarters to Catalyze Innovation and Strengthen Commitment to Customer Success July 19, 2023 – HERNDON, VA: Hive Pro, a pioneer in the Threat Exposure Management market is thrilled to announce its upcoming corporate relocation to a new state-of-the-art headquarters in Herndon, Virginia. The move …
PindOS malware deploying Bumblebee and IcedID
Threat Level Attack Report For a detailed threat advisory, download the pdf file here Summary PindOS, new JavaScript dropper has been spotted in the wild. It is specifically engineered to deliver next-stage payloads and is currently deploying infamous malwares like deploying Bumblebee and IcedID. To receive …
JokerSpy macOS Backdoor Attacks Japanese Cryptocurrency Exchange
Threat Level Attack Report For a detailed threat advisory, download the pdf file here Summary An unknown cryptocurrency exchange in Japan became the target of a precise attack employing an intricate Apple macOS backdoor called JokerSpy. References to JokerSpy can be traced back to as early …