enterprise security
New SSH-Snake Worm-Like Tool Threatens Network Security
Rohan Timalsina | | Cyber Threats, Cybersecurity, cybersecurity defense strategies, cybersecurity threats, Cybersecurity Weaknesses, enterprise security, Linux & Open Source News, open source, self-modifying worm, SSH malware, ssh private keys, SSH security, SSH-Snake, SSH-Snake malware, SSH-Snake worm, Sysdig Threat Research Team
The Sysdig Threat Research Team (TRT) discovered that a threat actor is leveraging an open-source network mapping tool called SSH-Snake for malicious activities. This tool utilizes SSH credentials found on the compromised ...
VMWare Urges Users to Uninstall EAP Immediately
Rohan Timalsina | | CVE-2024-22245, CVE-2024-22250, Cybersecurity, cybersecurity defense strategies, cybersecurity threats, Cybersecurity Weaknesses, Enhanced Authentication Plugin, enterprise security, Linux & Open Source News, security, security vulnerabilites, Virtualization, VMware
VMware has issued a no-patch advisory urging users to take swift action by removing the deprecated Enhanced Authentication Plug-in (EAP). EAP was deprecated nearly three years ago, in March 2021, with the ...
SNS Sender Script Used for Bulk Smishing Attacks
Rohan Timalsina | | AWS security, AWS SNS, AWS SNS Bulk Smishing, Cyber Threats, enterprise security, Linux & Open Source News, smishing attack
A new threat has emerged in the form of a Python script called SNS Sender, which malicious actors are utilizing to send bulk smishing messages through Amazon Web Services (AWS) Simple Notification ...
Ivanti Pulse Secure Found Using End of Life CentOS 6 OS
Rohan Timalsina | | CentOS 6, CentOS 6 ELS, CentOS 6 End of Life, Cyber Threats, Cybersecurity Weaknesses, Eclypsium, EMBA analysis, enterprise security, Extended Lifecycle Support, Ivanti Connect Secure, Ivanti Policy Secure, Ivanti Pulse Secure, Ivanti security, Ivanti Vulnerabilities, Linux & Open Source News, Linux kernel, Pulse Secure VPN, security vulnerabilites
Ivanti Pulse Secure VPN appliances have recently been a target of several sophisticated attacks, highlighting the ongoing challenges in safeguarding critical IT infrastructure like network devices. UNC5221, a nation-state group, exploited these ...
Roundcube Webmail Vulnerability Under Exploitation, Patch Now
Rohan Timalsina | | CISA Advisory, cisa known exploited vulnerabilities, cisa known exploited vulnerabilities catalog, CISA Threat Update, CVE-2023-43770, Cybersecurity, cybersecurity threats, enterprise security, Linux & Open Source News, Roundcube Webmail, Roundcube Webmail Vulnerability, security patches, security vulnerabilites
Recently, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) added a Roundcube webmail vulnerability to its Known Exploited Vulnerabilities (KEV) catalog. Tracked as CVE-2023-43770, this issue is a persistent cross-site scripting (XSS) ...
FritzFrog Botnet Strikes Back Exploiting Log4Shell Vulnerability
Rohan Timalsina | | Akamai, botnet, Botnet Tactics, CVE-2021-44228, cybersecurity threats, enterprise security, FritzFrog, FritzFrog botnet, Golang-based Botnet, Linux & Open Source News, Log4Shell Vulnerability, P2P botnet, PwnKit vulnerability, SSH malware
A new variant of the sophisticated botnet “FritzFrog” has emerged, leveraging the Log4Shell vulnerability for propagation. Despite more than two years passing since the Log4j flaw was discovered, attackers continue to exploit ...
Mitigate Ivanti Vulnerabilities: CISA Issues Emergency Directive
Rohan Timalsina | | CISA Advisories, CISA Emergency Directive, CISA Threat Update, CVE-2023-46805, CVE-2024-21887, Cyber Threats, enterprise security, Ivanti Connect Secure, Ivanti Policy Secure, Ivanti security, Ivanti Vulnerabilities, Linux & Open Source News, security patches, security vulnerabilites
In recent times, the cybersecurity landscape has witnessed a surge in threats targeting Ivanti Connect Secure and Ivanti Policy Secure solutions. The Cybersecurity and Infrastructure Security Agency (CISA) has raised a red ...
CISA Mandates Urgent Patching for Citrix NetScaler Vulnerabilities
Rohan Timalsina | | buffer-overflow-attacks, cisa known exploited vulnerabilities, cisa known exploited vulnerabilities catalog, Citrix NetScaler ADC, Citrix NetScaler Gateway, Citrix NetScaler Vulnerabilities, Citrix Vulnerabilities, code injection, Cyber Threats, Denial-of-Service (DoS), enterprise security, Google Chromium V8, Linux & Open Source News, Remote Code Execution (RCE), security vulnerabilites, urgent patching
In a recent move to bolster cybersecurity defenses, CISA has issued a directive to U.S. federal agencies to urgently secure their systems against three newly patched vulnerabilities in Citrix NetScaler and Google ...
HealthEC Data Breach Impacts 4.5 Million Patients
Rohan Timalsina | | Cyber Threats, Data breach, Data Breach Incident, enterprise security, healthcare, healthcare cybersecurity, healthcare data breach, healthcare organizations, HealthEC data breach, Linux & Open Source News, linux live patching, Live Patching Services
In the evolving landscape of healthcare cybersecurity, the recent data breach at HealthEC LLC has sent shockwaves through the industry, affecting nearly 4.5 million individuals who received care through the company’s diverse ...
Google Cloud Patched Privilege Escalation Vulnerability
Rohan Timalsina | | Cyber Threats, Cybersecurity Weaknesses, enterprise security, google cloud, Google Cloud Security, Google Cloud vulnerability, Kubernetes Security, Linux & Open Source News, Privilege Escalation, security patches
Recently, Google Cloud addressed a medium-severity security vulnerability that could potentially be exploited by attackers with access to a Kubernetes cluster. This flaw, discovered and reported by Palo Alto Networks Unit 42, ...