Category: CyberSecurity

  • SpyLoan: The Network of 18 Malicious Loan Apps Harvesting Your Data

    In a significant cybersecurity development, ESET, a leading Slovak cybersecurity firm, has unearthed a deceptive network of 18 malicious loan apps, collectively known as “SpyLoan.” These apps, designed to exploit users seeking financial services, have been downloaded over 12 million times. Primarily targeting regions in Southeast Asia, Africa, and Latin America, SpyLoan apps masquerade as…

  • Critical WebKit Vulnerabilities Patched in Latest Apple Updates

    Two significant vulnerabilities have been identified in the WebKit web browser engine, impacting a range of Apple devices and operating systems. These vulnerabilities are critical and require immediate attention. Apple has acknowledged these vulnerabilities and released updates for a range of devices. Users are urged to update their devices to the latest versions as soon…

  • Overview: Phish Tale of the Week Often times phishing campaigns, created by malicious actors, target users by utilizing social engineering. For example, in this text message, the actors are appearing as Royal Mail, a courier service, and informing you that action needs to be taken regarding your package’s delivery. The message politely explains that “RoyalMail”…

  • Netizen: November 2023 Vulnerability Review

    Security vulnerabilities are a constant threat to businesses. Netizen’s Security Operations Center has identified five critical vulnerabilities from November that require immediate attention. These include privilege escalation, path traversal, SQL injection, CSRF, and local privilege escalation issues in various software. Netizen offers advanced solutions and services to help businesses enhance their cybersecurity posture.

  • CISA Launches New Pilot Program to Bolster Cybersecurity in Critical Infrastructure Sectors

    The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has taken a significant step towards enhancing the cybersecurity posture of the nation’s critical infrastructure sectors. The agency has announced the launch of an innovative pilot program, aimed at extending cutting-edge cybersecurity shared services to critical infrastructure entities, especially those most in need of such support. This…

  • Understanding the Randstorm Vulnerability in Cryptocurrency Wallets: A Comprehensive Analysis

    Cryptocurrency wallets, particularly those created between 2011 and 2015, have recently been thrust into the spotlight due to a significant vulnerability known as “Randstorm.” This vulnerability has raised concerns across the cryptocurrency community, highlighting the risks associated with outdated software and insufficient security measures in digital asset management. What is the Randstorm Vulnerability? The Randstorm…

  • The Evolution from Hive to Hunters International: Ransomware Gangs Leveraging Peer Innovations

    In a landmark operation in early 2023, the FBI, along with German and Dutch authorities, dismantled Hive, a prolific ransomware group. This collective had extorted over $100 million since June 2021, targeting a wide range of sectors. The FBI’s operation infiltrated Hive’s network over seven months, obtaining decryption keys for over 300 recent victims and…

  • Netizen: Threat Detection and Advisory on Confluence Vulnerability CVE-2023-22518

    The discovery of CVE-2023-22518 presents a significant concern for organizations using Confluence Data Center and Server. Atlassian has granted the vulnerability a 10/10 CVSS score based on an internal assessment, however the NVD has yet to provide a score. This is the second major vulnerability discovered in Atlassian Confluence over the past few weeks; CVE-2023-22515,…

  • CVSS v4.0 is Public: What do you need to know about it?

    The Common Vulnerability Scoring System (CVSS) serves as a standard for assessing the severity of computer system security vulnerabilities. Its latest iteration, CVSS version 4.0, was originally shown in a public preview on June 8, 2023, at the 35th Annual FIRST Conference in Montreal, and was officially launched in General Availability (GA) on November 1st,…

  • Deepfake Technology: A Technical Analysis and Advisory

    The phrase “deepfake”, an amalgamation of the words “deep learning” and “fake,” is defined as any method of synthetic media, images, or video, that is manipulated in order to create a piece of media that conveys a different message. Using machine learning algorithms, malicious actors compile images and sounds from various sources, creating hoax videos…