Category: News

SAP to Give Threat Briefing on Uber-Severe ‘ICMAD’ Bugs

SAP’s Patch Tuesday brought fixes for a trio of flaws in the ubiquitous ICM component in internet-exposed apps. One of them, with a risk score of 10, could allow attackers…
Read more

PHP Everywhere Bugs Put 30K+ WordPress Sites at Risk of RCE

The plug-in’s default settings spawned flaws that could allow for full site takeover but have since been fixed in an update that users should immediately install, Wordfence researchers said.

Cybercriminals Swarm Windows Utility Regsvr32 to Spread Malware

The living-off-the-land binary (LOLBin) is anchoring a rash of cyberattacks bent on evading security detection to drop Qbot and Lokibot.

3 Tips for Facing the Harsh Truths of Cybersecurity in 2022, Part I

Sonya Duffin, ransomware and data-protection expert at Veritas Technologies, shares three steps organizations can take today to reduce cyberattack fallout.

Ex-Gumshoe Nabs Cybercrooks with FBI Tactics

Crane Hassold, former FBI analyst turned director of threat intel at Abnormal Security, shares stories from his covert work with cyberattackers.

MoleRats APT Flaunts New Trojan in Latest Cyberespionage Campaign

Researchers from Proofpoint have spotted a new Middle East-targeted phishing campaign that delivers a novel malware dubbed NimbleMamba.

No Critical Bugs for Microsoft February 2022 Patch Tuesday, 1 Zero-Day

This batch had zero critical CVEs, which is unheard of. Most (50) of the patches are labeled Important, so don’t delay to apply the patches, security experts said.

China Suspected of News Corp Cyberespionage Attack

Attackers infiltrated the media giant’s network using BEC, while Microsoft moved to stop such attacks by blocking VBA macros in 5 Windows apps. Included: more ways to help stop BEC.

CISA Orders Federal Agencies to Fix Actively Exploited Windows Bug

Feb. 18 is the deadline to patch a bug that affects all unpatched versions of Windows 10 and requires zero user interaction to exploit.

Medusa Malware Joins Flubot’s Android Distribution Network

Two powerful trojans with spyware and RAT capabilities are being delivered in side-by-side campaigns using a common infrastructure.