Hackers Exploiting Critical Fortinet EMS Vulnerability to Deploy Remote Access Tools https://firewall.firm.in/wp-content/uploads/2024/12/cyberattack.png Dec 20, 2024Ravie LakshmananVulnerability / Cyber Attack A now-patched critical security flaw impacting Fortinet FortiClient EMS is being exploited by malicious actors as part of a cyber campaign that installed remote desktop software such as AnyDesk and ScreenConnect. The vulnerability in question is CVE-2023-48788 (CVSS score: 9.3), an ...
Read More »Vulnerabilities & Exploits
Thousands Download Malicious npm Libraries Impersonating Legitimate Tools
Thousands Download Malicious npm Libraries Impersonating Legitimate Tools https://firewall.firm.in/wp-content/uploads/2024/12/npm.png Dec 19, 2024Ravie LakshmananSupply Chain / Software Security Threat actors have been observed uploading malicious typosquats of legitimate npm packages such as typescript-eslint and @types/node that have racked up thousands of downloads on the package registry. The counterfeit versions, named @typescript_eslinter/eslint and types-node, are engineered to download a trojan and retrieve ...
Read More »HubPhish Exploits HubSpot Tools to Target 20,000 European Users for Credential Theft
HubPhish Exploits HubSpot Tools to Target 20,000 European Users for Credential Theft https://firewall.firm.in/wp-content/uploads/2024/12/password.png Dec 18, 2024Ravie LakshmananEmail Security / Cloud Security Cybersecurity researchers have disclosed a new phishing campaign that has targeted European companies with an aim to harvest account credentials and take control of the victims’ Microsoft Azure cloud infrastructure. The campaign has been codenamed HubPhish by Palo Alto ...
Read More »Attackers Exploit Microsoft Teams and AnyDesk to Deploy DarkGate Malware
Attackers Exploit Microsoft Teams and AnyDesk to Deploy DarkGate Malware https://firewall.firm.in/wp-content/uploads/2024/12/malware.png Dec 17, 2024Ravie LakshmananMalware / Credential Theft A new social engineering campaign has leveraged Microsoft Teams as a way to facilitate the deployment of a known malware called DarkGate. “An attacker used social engineering via a Microsoft Teams call to impersonate a user’s client and gain remote access to ...
Read More »The Mask APT Resurfaces with Sophisticated Multi-Platform Malware Arsenal
The Mask APT Resurfaces with Sophisticated Multi-Platform Malware Arsenal https://firewall.firm.in/wp-content/uploads/2024/12/mark.png Dec 17, 2024Ravie LakshmananCyber Espionage / Mobile Security A little-known cyber espionage actor known as The Mask has been linked to a new set of attacks targeting an unnamed organization in Latin America twice in 2019 and 2022. “The Mask APT is a legendary threat actor that has been performing ...
Read More »DeceptionAds Delivers 1M+ Daily Impressions via 3,000 Sites, Fake CAPTCHA Pages
DeceptionAds Delivers 1M+ Daily Impressions via 3,000 Sites, Fake CAPTCHA Pages https://firewall.firm.in/wp-content/uploads/2024/12/adclick.png Dec 16, 2024Ravie LakshmananMalvertising / Threat Intelligence Cybersecurity researchers have shed light on a previously undocumented aspect associated with ClickFix-style attacks that hinge on taking advantage of a single ad network service as part of a malvertising-driven information stealer campaign dubbed DeceptionAds. “Entirely reliant on a single ad ...
Read More »Why you take phone chargers from unknown people? Hackers can steal data. Tips to stay safe – ET CISO
Why you take phone chargers from unknown people? Hackers can steal data. Tips to stay safe – ET CISO https://etimg.etb2bimg.com/thumb/msid-116354721,imgsize-39436,width-1200,height=765,overlay-etciso/data-breaches/why-you-take-phone-chargers-from-unknown-people-hackers-can-steal-data-tips-to-stay-safe.jpg We’ve all been there — scrambling to find a charger when our phone’s battery is running low, only to settle for using someone else’s cable. But this simple act of sharing a charger could expose you to significant cybersecurity risks. ...
Read More »NoviSpy Spyware Installed on Journalist’s Phone After Unlocking It With Cellebrite Tool
NoviSpy Spyware Installed on Journalist’s Phone After Unlocking It With Cellebrite Tool https://firewall.firm.in/wp-content/uploads/2024/12/spyware.png A Serbian journalist had his phone first unlocked by a Cellebrite tool and subsequently compromised by a previously undocumented spyware codenamed NoviSpy, according to a new report published by Amnesty International. “NoviSpy allows for capturing sensitive personal data from a target’s phone after infection and provides the ...
Read More »Thai Officials Targeted in Yokai Backdoor Campaign Using DLL Side-Loading Techniques
Thai Officials Targeted in Yokai Backdoor Campaign Using DLL Side-Loading Techniques https://firewall.firm.in/wp-content/uploads/2024/12/malware.png Dec 14, 2024Ravie LakshmananMalware / Cyber Threat Thai government officials have emerged as the target of a new campaign that leverages a technique called DLL side-loading to deliver a previously undocumented backdoor dubbed Yokai. “The target of the threat actors were Thailand officials based on the nature of ...
Read More »Germany Disrupts BADBOX Malware on 30,000 Devices Using Sinkhole Action
Germany Disrupts BADBOX Malware on 30,000 Devices Using Sinkhole Action https://firewall.firm.in/wp-content/uploads/2024/12/badbox.png Dec 14, 2024Ravie LakshmananBotnet / Ad Fraud Germany’s Federal Office of Information Security (BSI) has announced that it has disrupted a malware operation called BADBOX that came preloaded on at least 30,000 internet-connected devices sold across the country. In a statement published earlier this week, authorities said they severed ...
Read More »
Firewall Security Company India Complete Firewall Security Solutions Provider Company in India











