Cyber security aggregate rss news

Cyber security aggregator - feeds history

 Breaches and Incidents

CrowdStrike encountered a previously undocumented post-exploitation framework called IceApple deployed on Exchange servers for data exfiltration. Its long-running campaign focuses on intelligence gathering and indicates that it is a state-sponsored mission, allegedly, aligning with China-nexus, state-sponsored   show more ...

intrusions. Hence, it is imperative that all web apps are patched on a regular basis to prevent IceApple from compromising your network.

 Malware and Vulnerabilities

Threat actors are using Tor and Telegram to spread the Eternity malware that is customizable to modules, including a stealer, clipper, worm, miner, and ransomware. It can pilfer information from cryptocurrency extensions or even cold wallets. It also targets password managers, VPN clients, messengers, and gaming clients. Businesses are advised to have robust security measures in place to thwart such threats.

2022-05
SUN
MON
TUE
WED
THU
FRI
SAT
MayJuneJuly