Select Page

BlindEagle

BlindEagle (APT-C-36) is an advanced persistent threat (APT) actor known for straightforward but effective attack methods, targeting entities in Colombia, Ecuador, Chile, Panama, and other Latin American countries.Target Sectors: The group focuses on governmental...

TLS Bootstrap Attack on Azure Kubernetes Clusters

Security Flaw Discovered: Researchers have identified a vulnerability in Microsoft Azure Kubernetes Services (AKS) that could allow attackers to escalate privileges and access cluster credentials. Attack Method: Exploits involve downloading cluster node configuration...

Hackers are exploiting a critical PHP flaw

Vulnerability Exploited: Hackers are exploiting a critical PHP flaw (CVE-2024-4577, CVSS score: 9.8) to deploy the Msupedge backdoor. Target: An unnamed university in Taiwan. Backdoor Details: Msupedge communicates with a command-and-control server using DNS...

UULoader

A new malware called UULoader is being used by cybercriminals to distribute dangerous tools like Gh0st RAT and Mimikatz, particularly targeting Korean and Chinese speakers. Discovered by the Cyberint Research Team, UULoader is distributed via malicious installers...

OWASP Top 10

The OWASP Top 10 is a list of the most critical security risks to web applications. It is updated periodically to reflect the latest threats and vulnerabilities. Here is the OWASP Top 10 as of 2024: Broken Access Control Description: Issues with access control can...

key points to understand in Software Development Security

1. Code Review Description: A peer-driven process where multiple developers review code to ensure quality and identify defects. It can be manual or automated and is typically performed after code development. Reviews can cover several hundred lines of code per hour....

Latest Post:

Pin It on Pinterest