U.S. Government Blacklists Cytrox and Intellexa Spyware Vendors for Cyber Espionage
The U.S. government on Tuesday added two foreign commercial spyware vendors, Cytrox and Intellexa, to an economic blocklist for weaponizing cyber exploits to gain unauthorized access to devices and “threatening the privacy and security of individuals and organizations worldwide.” This includes the companies’ corporate holdings in Hungary (Cytrox Holdings Crt), North Macedonia (Cytrox AD), Greece
Zero-Day Attacks Exploited Critical Vulnerability in Citrix ADC and Gateway
Citrix is alerting users of a critical security flaw in NetScaler Application Delivery Controller (ADC) and Gateway that it said is being actively exploited in the wild. Tracked as CVE-2023-3519 (CVSS score: 9.8), the issue relates to a case of code injection that could result in unauthenticated remote code execution. It impacts the following versions – NetScaler ADC and NetScaler Gateway […]
FakeSG enters the ‘FakeUpdates’ arena to deliver NetSupport RAT
Over 5 years ago, we began tracking a new campaign that we called FakeUpdates (also known as SocGholish) that used compromised websites to trick users into running a fake browser update. Instead, victims would end up infecting their computers with the NetSupport RAT, allowing threat actors to gain remote access and deliver additional payloads. As we have […]
Five key ways to effectively manage email signatures
By Owais Sultan Email is a key, highly effective communication concept used by a variety of business environments around the world.… This is a post from HackRead.com Read the original post: Five key ways to effectively manage email signatures
Attacker exploits vulnerability in Active Directory Certificate Services to take control of domain – post by LinkCyb
This post was made possible through the contributions of Joseph Spero and Thanassis Diogos. In June 2023, IBM Security X-Force responded to an incident where a client had received alerts from their security tooling regarding potential malicious activity originating from a system within their network targeting a domain controller. X-Force analysis revealed that an attacker […]
VirusTotal Data Leak Exposes User Info, Including Intel Agencies’ Data
By Habiba Rashid The news was initially reported by The Standard and German news magazine Der Spiegel, who claim the data leak is authentic. This is a post from HackRead.com Read the original post: VirusTotal Data Leak Exposes User Info, Including Intel Agencies’ Data
Pakistani Entities Targeted in Sophisticated Attack Deploying ShadowPad Malware
An unidentified threat actor compromised an application used by multiple entities in Pakistan to deliver ShadowPad, a successor to the PlugX backdoor that’s commonly associated with Chinese hacking crews. Targets included a Pakistan government entity, a public sector bank, and a telecommunications provider, according to Trend Micro. The infections took place between mid-February 2022 and
Phishers Targeting Diplomats in Kyiv with Fake 2011 BMW Flyers
By Deeba Ahmed The fake flyer was emailed on 4 May 2023 to multiple diplomatic missions in Kyiv. This is a post from HackRead.com Read the original post: Phishers Targeting Diplomats in Kyiv with Fake 2011 BMW Flyers
VirusTotal Data Leak Exposes Some Registered Customers’ Details
Data associated with a subset of registered customers of VirusTotal, including their names and email addresses, have leaked on the internet. The security incident, which comprises a database of 5,600 names in a 313KB file, was first disclosed by Der Spiegel and Der Standard yesterday. Launched in 2004, VirusTotal is a popular service that analyzes suspicious files and URLs […]
Go Beyond the Headlines for Deeper Dives into the Cybercriminal Underground
Discover stories about threat actors’ latest tactics, techniques, and procedures from Cybersixgill’s threat experts each month. Each story brings you details on emerging underground threats, the threat actors involved, and how you can take action to mitigate risks. Learn about the top vulnerabilities and review the latest ransomware and malware trends from the deep and […]