Month: January 2023

Jan 12, 2023Ravie LakshmananActive Directory / Malware A recent IcedID malware attack enabled the threat actor to compromise the Active Directory domain of an unnamed target less than 24 hours after gaining initial access. “Throughout the attack, the attacker followed a routine of recon commands, credential theft, lateral movement by abusing Windows protocols, and executing
0 Comments
The Information and Broadcasting Ministry (I&B) on Thursday exposed six YouTube channels for “working in a coordinated manner and spreading false information” about the government, elections, proceedings in the Supreme Court and Parliament of India, the president and the prime minister. Last December, the Centre flagged three channels peddling fake news. In an official statement,
0 Comments
Jan 12, 2023Ravie LakshmananFirmware and Hardware Security Security researchers have disclosed multiple architectural vulnerabilities in Siemens SIMATIC and SIPLUS S7-1500 programmable logic controllers (PLCs) that could be exploited by a malicious actor to stealthily install firmware on affected devices and take control of them. Discovered by Red Balloon Security, the issues are tracked as CVE-2022-38773
0 Comments
Jan 12, 2023Ravie LakshmananServer Security / Linux Malicious actors are actively attempting to exploit a recently patched critical vulnerability in Control Web Panel (CWP) that enables elevated privileges and unauthenticated remote code execution (RCE) on susceptible servers. Tracked as CVE-2022-44877 (CVSS score: 9.8), the bug impacts all versions of the software before 0.9.8.1147 and was
0 Comments
Apple may be considering replacing the iPhone 15 Pro’s clickable volume and power buttons with solid-state buttons. This detail was shared by a technology analyst, who compared it to the time the iPhone 7 changed the clickable Home button with a solid-state Home button. The analyst also said that if iPhone users “respond favourably” to
0 Comments
Jan 11, 2023Ravie LakshmananCyber Threat / Malware A new analysis of Raspberry Robin’s attack infrastructure has revealed that it’s possible for other threat actors to repurpose the infections for their own malicious activities, making it an even more potent threat. Raspberry Robin (aka QNAP worm), attributed to a threat actor dubbed DEV-0856, is malware that
0 Comments