Threat actors can bypass malware detection due to Microsoft Defender weakness

Threat actors can leverage a weakness in Microsoft Defender to determine in which folders to plant malware. The knowledge of the list of scanning exceptions allows attackers to know where to store their malicious code to avoid detection.

Phishers are targeting Office 365 users by exploiting Adobe Cloud

Phishers are creating Adobe Creative Cloud accounts and using them to send phishing emails capable of thwarting traditional checks and some advanced threat protection solutions, Avanan security researcher Jeremy Fuchs warns.

US Cyber Command links MuddyWater to Iranian intelligence

On Twitter, Cyber Command said MuddyWater was using a suite of malware for espionage and malicious activity, with attribution provided by the FBI National Cyber Investigative Joint Task Force.

CISA adds 15 exploited vulnerabilities from Google, IBM, Microsoft, Oracle and more to catalog

The most urgent additions to the CISA list include a vulnerability in VMware vCenter Server, flaws in Hikvision products, and a FatPipe WARP, IPVPN, and MPVPN vulnerability.

Federal Agencies Warn of Russian State-Sponsored Threats to U.S. Critical Infrastructure

"This guidance is being released to broadly share known tactics, techniques, and procedures, and encourage network defenders to take recommended actions," a CISA spokesperson said.

FBI: FIN7 hackers target US companies with BadUSB devices to install ransomware

The FBI has said that FIN7, an infamous cybercrime group, has sent malicious USB devices to US companies over the past few months in the hopes of infecting their systems with malware and carrying out future attacks.

CISA releases Apache Log4j scanner to find vulnerable apps

The tool enables security teams to scan network hosts for Log4j RCE exposure and spot WAF bypasses that can allow threat actors to gain code execution within the organization's environment.

FBI Sees APTs Exploiting Recent ManageEngine Desktop Central Vulnerability

The Federal Bureau of Investigation (FBI) has released an alert regarding the exploitation of a recent vulnerability, tracked as CVE-2021-44515, in Zoho’s ManageEngine Desktop Central product.

Australian ACSC warns of Conti ransomware attacks against local organizations

Since August 2020, the group has launched its leak site to threaten its victim to release the stolen data. Conti operators claimed to have already compromised at least 500 organizations worldwide.

1.6 Million WordPress Sites Under Cyberattack From Over 16,000 IP Addresses

As many as 1.6 million WordPress sites have been targeted by an active large-scale attack campaign originating from 16,000 IP addresses by exploiting weaknesses in four plugins and 15 Epsilon Framework themes.

Defend Against Threats with Cyber Fusion

Cyware is the leading provider of cyber fusion solutions that power threat intelligence sharing , end-to-end automation and 360-degree threat response.

Trending Tags