Hackers Abuse EDRSilencer Tool to Bypass Security and Hide Malicious Activity https://firewall.firm.in/wp-content/uploads/2024/10/hacker.png Oct 16, 2024Ravie LakshmananEndpoint Security / Malware Threat actors are attempting to abuse the open-source EDRSilencer tool as part of efforts to tamper endpoint detection and response (EDR) solutions and hide malicious activity. Trend Micro said it detected “threat actors attempting to integrate EDRSilencer in their attacks, repurposing ...
Read More »Vulnerabilities & Exploits
OilRig Exploits Windows Kernel Flaw in Espionage Campaign Targeting UAE and Gulf
OilRig Exploits Windows Kernel Flaw in Espionage Campaign Targeting UAE and Gulf https://firewall.firm.in/wp-content/uploads/2024/10/cyberattac.png Oct 13, 2024Ravie Lakshmanan The Iranian threat actor known as OilRig has been observed exploiting a now-patched privilege escalation flaw impacting the Windows Kernel as part of a cyber espionage campaign targeting the U.A.E. and the broader Gulf region. “The group utilizes sophisticated tactics that include deploying ...
Read More »Bohemia and Cannabia Dark Web Markets Taken Down After Joint Police Operation
Bohemia and Cannabia Dark Web Markets Taken Down After Joint Police Operation https://firewall.firm.in/wp-content/uploads/2024/10/arrested.png Oct 11, 2024Ravie LakshmananCybercrime / Dark Web The Dutch police have announced the takedown of Bohemia and Cannabia, which has been described as the world’s largest and longest-running dark web market for illegal goods, drugs, and cybercrime services. The takedown is the result of a collaborative investigation ...
Read More »GitHub, Telegram Bots, and QR Codes Abused in New Wave of Phishing Attacks
GitHub, Telegram Bots, and QR Codes Abused in New Wave of Phishing Attacks https://firewall.firm.in/wp-content/uploads/2024/10/phishing.png A new tax-themed malware campaign targeting insurance and finance sectors has been observed leveraging GitHub links in phishing email messages as a way to bypass security measures and deliver Remcos RAT, indicating that the method is gaining traction among threat actors. “In this campaign, legitimate repositories ...
Read More »How Hybrid Password Attacks Work and How to Defend Against Them
How Hybrid Password Attacks Work and How to Defend Against Them https://firewall.firm.in/wp-content/uploads/2024/10/password.png Threat actors constantly change tactics to bypass cybersecurity measures, developing innovative methods to steal user credentials. Hybrid password attacks merge multiple cracking techniques to amplify their effectiveness. These combined approaches exploit the strengths of various methods, accelerating the password-cracking process. In this post, we’ll explore hybrid attacks — ...
Read More »CISA Warns of Threat Actors Exploiting F5 BIG-IP Cookies for Network Reconnaissance
CISA Warns of Threat Actors Exploiting F5 BIG-IP Cookies for Network Reconnaissance https://firewall.firm.in/wp-content/uploads/2024/10/big-ip.png Oct 11, 2024Ravie LakshmananVulnerability / Network Security The U.S. Cybersecurity and Infrastructure Security Agency (CISA) is warning that it has observed threat actors leveraging unencrypted persistent cookies managed by the F5 BIG-IP Local Traffic Manager (LTM) module to conduct reconnaissance of target networks. It said the module ...
Read More »New Critical GitLab Vulnerability Could Allow Arbitrary CI/CD Pipeline Execution
New Critical GitLab Vulnerability Could Allow Arbitrary CI/CD Pipeline Execution https://firewall.firm.in/wp-content/uploads/2024/10/gitlab.png Oct 11, 2024Ravie LakshmananDevOps / Vulnerability GitLab has released security updates for Community Edition (CE) and Enterprise Edition (EE) to address eight security flaws, including a critical bug that could allow running Continuous Integration and Continuous Delivery (CI/CD) pipelines on arbitrary branches. Tracked as CVE-2024-9164, the vulnerability carries a ...
Read More »OpenAI Blocks 20 Global Malicious Campaigns Using AI for Cybercrime and Disinformation
OpenAI Blocks 20 Global Malicious Campaigns Using AI for Cybercrime and Disinformation https://firewall.firm.in/wp-content/uploads/2024/10/ai-content.png Oct 10, 2024Ravie LakshmananCybercrime / Disinformation OpenAI on Wednesday said it has disrupted more than 20 operations and deceptive networks across the world that attempted to use its platform for malicious purposes since the start of the year. This activity encompassed debugging malware, writing articles for websites, ...
Read More »Cybercriminals Use Unicode to Hide Mongolian Skimmer in E-Commerce Platforms
Cybercriminals Use Unicode to Hide Mongolian Skimmer in E-Commerce Platforms https://firewall.firm.in/wp-content/uploads/2024/10/shopping.png Oct 10, 2024Ravie LakshmananCybercrime / Malware Cybersecurity researchers have shed light on a new digital skimmer campaign that leverages Unicode obfuscation techniques to conceal a skimmer dubbed Mongolian Skimmer. “At first glance, the thing that stood out was the script’s obfuscation, which seemed a bit bizarre because of all ...
Read More »N. Korean Hackers Use Fake Interviews to Infect Developers with Cross-Platform Malware
N. Korean Hackers Use Fake Interviews to Infect Developers with Cross-Platform Malware https://firewall.firm.in/wp-content/uploads/2024/10/attack.png Oct 09, 2024Ravie LakshmananPhishing Attack / Malware Threat actors with ties to North Korea have been observed targeting job seekers in the tech industry to deliver updated versions of known malware families tracked as BeaverTail and InvisibleFerret. The activity cluster, tracked as CL-STA-0240, is part of a ...
Read More »
Firewall Security Company India Complete Firewall Security Solutions Provider Company in India











