Okta Warns of Phishing Attacks Mimic “Okta Support” to Steal MFA Tokens
Okta, a leading identity and access management platform, has issued a warning about an increase in sophisticated phishing attacks targeting its customers by impersonating the company's support team.
These attacks are part of a...
New QR Code-Based C2 Attack Lets Hackers Bypass All Type of Browser Isolation Security
Cybersecurity firm Mandiant has uncovered a novel method to bypass browser isolation technologies, a widely used security measure designed to protect users from web-based attacks such as phishing and malware.
This new way to...
Storm-1811 Hackers Exploits RMM Tools to Deliver Black Basta Ransomware
Storm-1811, a financially driven threat actor that employs social engineering techniques, has recently been observed exploiting RMM tools to distribute the Black Basta ransomware.
The threat actor exploits the client management tool, Microsoft Quick Assist,...
Linux Kernel 6.13 Released – Avoiding Holiday Season Clash
In a rare occurrence, the Linux kernel development cycle has aligned favorably with the holiday season this year. Linus Torvalds, the creator and principal developer of the Linux kernel, announced the release of Linux...
CoinLurker, Next-Gen Tool Used by Threat Actors in Modern Cyberattacks
CoinLurker is a sophisticated data-stealing malware that has revolutionized fake update campaigns. Written in the Go programming language, CoinLurker incorporates advanced obfuscation and anti-analysis techniques, enabling it to evade detection and execute stealthy cyberattacks.
According...
Curl Vulnerability Let Attackers Access Sensitive Information
A critical security flaw has been discovered in the popular data transfer tool Curl, potentially allowing attackers to access sensitive information.
The vulnerability, identified as CVE-2024-11053, affects curl versions 6.5 through 8.11.0 and could lead...
Vulnerabilities in Skoda & Volkswagen Cars Let Hackers Remotely Track Users
Cybersecurity researchers have discovered several vulnerabilities in the infotainment systems of certain Skoda and Volkswagen car models. These vulnerabilities may allow hackers to track and access sensitive user data remotely.
PCAutomotive, a specialized automotive cybersecurity...
Let’s Encrypt to End Support for Online Certificate Status Protocol (OCSP)
Let’s Encrypt, a leading provider of free SSL/TLS certificates, has officially announced its timeline for discontinuing support for the Online Certificate Status Protocol (OCSP) in favor of Certificate Revocation Lists (CRLs).
This decision, driven by...
Chrome Security Update, Patch for 3 High-severity Vulnerabilities
Google has released a critical security update for its Chrome browser, addressing three high-severity vulnerabilities that could potentially expose users to significant risks.
The latest update, version 131.0.6778.139/.140 for Windows and Mac and 131.0.6778.139 for...
D-Link Routers Under Attack – Botnet Exploiting Devices to Gain Full Remote Control
A surge in cyberattacks leveraging legacy vulnerabilities in D-Link routers has been detected, with two botnets, FICORA and CAPSAICIN, actively exploiting these weaknesses.
Researchers at Fortinet’s FortiGuard Labs observed a spike in activity from...