The Best Practices Of A Successful Migration – Article by Linkcyb Team

Numerous companies are improving their digital tools such as the cloud. The cloud is very important for a business as it is a safe place to store important information and documents of a company. When dealing with migrating your company’s assets to the cloud infrastructure, you need to be confident in the process as well […]

Security News This Week: Criminals Are Using Tiny Devices to Hack and Steal Cars – post by LinkCyb

Employees of the US Immigration and Customs Enforcement agency (ICE) abused law enforcement databases to snoop on their romantic partners, neighbors, and business associates, WIRED exclusively revealed this week. New data obtained through record requests show that hundreds of ICE staffers and contractors have faced investigations since 2016 for attempting to access medical, biometric, and location […]

Too Good To Be True? That Could Be An Identity Theft Scam – Article by Linkcyb Team

Identity theft continues to be a major cause of concern as hackers are finding new ways to exploit the information. Over the years, identity theft reported cases noted a steep rise, more so during the Covid-19 pandemic, where cybercriminals utilized the panic and uncertainty to their advantage. According to a Javelin Strategy & Research ‘Identity […]

Lazarus X_TRADER Hack Impacts Critical Infrastructure Beyond 3CX Breach

Apr 22, 2023Ravie LakshmananSupply Chain / Cyber Threat Lazarus, the prolific North Korean hacking group behind the cascading supply chain attack targeting 3CX, also breached two critical infrastructure organizations in the power and energy sector and two other businesses involved in financial trading using the trojanized X_TRADER application. The new findings, which come courtesy of […]

Will Cybercrime Erupt With Baphomet Returning To Telegram? – Article by Linkcyb Team

After the arrest of the former admin of the BreachForums, Pompompurin, the succeeding administrator Baphomet has gotten into a game of peekaboo on the dark web. Baphomet released a Telegram post stating that they were neither arrested nor ‘boarded by any naval fleets’ and would remain active. With Baphomet returning to Telegram, petty cybercriminals looking […]

CISA Adds 3 Actively Exploited Flaws to KEV Catalog, including Critical PaperCut Bug – Article by Linkcyb Team

Apr 22, 2023Ravie LakshmananPatch Management / Vulnerability The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Friday added three security flaws to its Known Exploited Vulnerabilities (KEV) catalog, based on evidence of active exploitation. The three vulnerabilities are as follows – CVE-2023-28432 (CVSS score – 7.5) – MinIO Information Disclosure Vulnerability CVE-2023-27350 (CVSS score – […]

Malware-Traffic-Analysis.net – 2023-04-19 – Quick post: Qakbot (Qbot) activity, distribution tags BB24 and obama254 – Article by LinkCyb

2023-04-19 (WEDNESDAY) – QUICK POST: QAKBOT (QBOT) ACTIVITY, DISTRIBUTION TAGS BB24 AND OBAMA254 NOTES: This post documents the differences in distribution for BB-series Qakbot and for obama-series Qakbot. On 2023-04-19, BB24 malsapm first used OneNote attachments as the initial lure, then switched to PDF attachments. After BB24 malspam switched to PDF attachments, the PDF links […]

update now! – Naked Security Linkcyb

Logging software has made cyberinsecurity headlines many times before, notably in the case of the Apache Log4J bug known as Log4Shell that ruined Christmas for many sysadmins at the end of 2021. The Log4Shell hole was a security flaw in the logging process itself, and boiled down to the fact that many logfile systems allow […]

Schneider Electric APC Easy UPS Online Monitoring Software Unauthenticated RMI Calls – Research Advisory – Article by LinkCyb

A vulnerability in Schneider Electric APC Easy UPS Online Monitoring Software V2.5-GS-01-22320 allows an unauthenticated remote attacker to issue RMI calls to certain remote Java objects in the application. For example, the attacker can invoke cn.com.voltronicpower.rmiclass.SystemService.updateManagerPassword() to change the administrator password for the monitoring software. POC: – Install remote-method-guesser ( – Run: java -jar rmg-4.3.1-jar-with-dependencies.jar […]