• Patch Alert: Critical Apache Struts Flaw Found, Exploitation Attempts Detected

    Patch Alert: Critical Apache Struts Flaw Found, Exploitation Attempts Detected

    Threat actors are attempting to exploit a recently disclosed security flaw impacting Apache Struts that could pave the way for remote code execution. The issue, tracked as CVE-2024-53677, carries a CVSS score of 9.5 out of 10.0, indicating critical severity. The vulnerability shares similarities with another critical bug the project maintainers addressed in December 2023…

    Read More

  • Not Your Old ActiveState: Introducing our End-to-End OS Platform

    Not Your Old ActiveState: Introducing our End-to-End OS Platform

    Having been at ActiveState for nearly eight years, I’ve seen many iterations of our product. However, one thing has stayed true over the years: Our commitment to the open source community and companies using open source in their code. ActiveState has been helping enterprises manage open source for over a decade. In the early days,…

    Read More

  • APT29 Hackers Target High-Value Victims Using Rogue RDP Servers and PyRDP

    APT29 Hackers Target High-Value Victims Using Rogue RDP Servers and PyRDP

    The Russia-linked APT29 threat actor has been observed repurposing a legitimate red teaming attack methodology as part of cyber attacks leveraging malicious Remote Desktop Protocol (RDP) configuration files. The activity, which has targeted governments and armed forces, think tanks, academic researchers, and Ukrainian entities, entails adopting a “rogue RDP” technique that was previously

    Read More

  • ONLY Cynet Delivers 100% Protection and 100% Detection Visibility in the 2024 MITRE ATT&CK Evaluation

    ONLY Cynet Delivers 100% Protection and 100% Detection Visibility in the 2024 MITRE ATT&CK Evaluation

    Across small-to-medium enterprises (SMEs) and managed service providers (MSPs), the top priority for cybersecurity leaders is to keep IT environments up and running. To guard against cyber threats and prevent data breaches, it’s vital to understand the current cybersecurity vendor landscape and continually assess the effectiveness of available solutions. Luckily, the 2024 MITRE ATT&CK

    Read More

  • Even Great Companies Get Breached — Find Out Why and How to Stop It

    Even Great Companies Get Breached — Find Out Why and How to Stop It

    Even the best companies with the most advanced tools can still get hacked. It’s a frustrating reality: you’ve invested in the right solutions, trained your team, and strengthened your defenses. But breaches still happen. So, what’s going wrong? The truth is, that attackers are constantly finding new ways to slip through cracks that often go…

    Read More

  • Bitter APT Targets Turkish Defense Sector with WmRAT and MiyaRAT Malware

    Bitter APT Targets Turkish Defense Sector with WmRAT and MiyaRAT Malware

    A suspected South Asian cyber espionage threat group known as Bitter targeted a Turkish defense sector organization in November 2024 to deliver two C++-malware families tracked as WmRAT and MiyaRAT. “The attack chain used alternate data streams in a RAR archive to deliver a shortcut (LNK) file that created a scheduled task on the target…

    Read More

  • 5 Practical Techniques for Effective Cyber Threat Hunting

    5 Practical Techniques for Effective Cyber Threat Hunting

    Addressing cyber threats before they have a chance to strike or inflict serious damage is by far the best security approach any company can embrace. Achieving this takes a lot of research and proactive threat hunting. The problem here is that it is easy to get stuck in endless arrays of data and end up…

    Read More

  • Hackers Exploit Webview2 to Deploy CoinLurker Malware and Evade Security Detection

    Hackers Exploit Webview2 to Deploy CoinLurker Malware and Evade Security Detection

    Bogus software update lures are being used by threat actors to deliver a new stealer malware called CoinLurker. “Written in Go, CoinLurker employs cutting-edge obfuscation and anti-analysis techniques, making it a highly effective tool in modern cyber attacks,” Morphisec researcher Nadav Lorber said in a technical report published Monday. The attacks make use of fake…

    Read More

  • The Mask APT Resurfaces with Sophisticated Multi-Platform Malware Arsenal

    The Mask APT Resurfaces with Sophisticated Multi-Platform Malware Arsenal

    A little-known cyber espionage actor known as The Mask has been linked to a new set of attacks targeting an unnamed organization in Latin America twice in 2019 and 2022. “The Mask APT is a legendary threat actor that has been performing highly sophisticated attacks since at least 2007,” Kaspersky researchers Georgy Kucherin and Marc…

    Read More

  • DeceptionAds Delivers 1M+ Daily Impressions via 3,000 Sites, Fake CAPTCHA Pages

    DeceptionAds Delivers 1M+ Daily Impressions via 3,000 Sites, Fake CAPTCHA Pages

    Cybersecurity researchers have shed light on a previously undocumented aspect associated with ClickFix-style attacks that hinge on taking advantage of a single ad network service as part of a malvertising-driven information stealer campaign dubbed DeceptionAds. “Entirely reliant on a single ad network for propagation, this campaign showcases the core mechanisms of malvertising — delivering over

    Read More