by valino | Dec 16, 2023 | Hacking
Multiple security vulnerabilities have been discovered in the open-source Netgate pfSense firewall solution called pfSense that could be chained by an attacker to execute arbitrary commands on susceptible appliances. The issues relate to two reflected cross-site...
by valino | Dec 16, 2023 | Hacking
A previously unknown hacker outfit called GambleForce has been attributed to a series of SQL injection attacks against companies primarily in the Asia-Pacific (APAC) region since at least September 2023. “GambleForce uses a set of basic yet very effective...
by valino | Dec 2, 2023 | Hacking, SOC
Google has revealed a new multilingual text vectorizer called RETVec (short for Resilient and Efficient Text Vectorizer) to help detect potentially harmful content such as spam and malicious emails in Gmail. “RETVec is trained to be resilient against...
by valino | Dec 2, 2023 | Zero-Day
A suspected Chinese-speaking threat actor has been attributed to a malicious campaign that targets the Uzbekistan Ministry of Foreign Affairs and South Korean users with a remote access trojan called SugarGh0st RAT. The activity, which commenced no later than August...
by valino | Dec 2, 2023 | Zero-Day
Apple has released software updates for iOS, iPadOS, macOS, and Safari web browser to address two security flaws that it said have come under active exploitation in the wild on older versions of its software. The vulnerabilities, both of which reside in the WebKit web...
by valino | Nov 18, 2023 | SOC
In the complex world of cybersecurity, understanding how attackers operate is crucial for robust defense strategies. Attack frameworks, systematic representations of the tactics, techniques, and procedures (TTPs) used by cyber adversaries, are indispensable tools in...
by valino | Nov 11, 2023 | Network
In the vast universe of cybersecurity, there exists a sentinel known as a reverse proxy, which stands guard between your web server and the relentless sea of internet traffic. Acting as an intermediary, the reverse proxy evaluates requests coming from the internet...
by valino | Nov 11, 2023 | Cryptography
In an era where data breaches are not just incidents but catastrophic events that can define an organization’s future, ISO 27701 emerges as a beacon of guidance for privacy management. As a cybersecurity expert, I will unravel the complexities of ISO 27701,...
by valino | Oct 31, 2023 | Cryptography
In the world of cryptography, ciphers act as the cornerstone for ensuring the confidentiality and security of data during transmission. Among the myriad of ciphers available, RC4 and Triple DES (3DES) stand as notable mentions. Although both aim to provide data...
by valino | Oct 19, 2023 | SOC
In the digital age, securing your computer against malicious software is akin to locking your doors at night. Viral hacks, encompassing a range of malicious software including viruses, trojans, and worms, pose a constant threat to your data and privacy. Implementing a...