Tuesday, April 13, 2021
Home Quick Bytes

Quick Bytes

Threat Actors Deliver IcedID Malware via Contact Forms

Threat Actors Deliver IcedID Malware Via Contact Forms

Attackers use legitimate corporate contact forms to deliver phishing emails to infect enterprise targets with the IcedID info-stealing malware and also threaten them with...
FBI Arrests Man for Planning to Destroy “70% of Internet”

FBI Arrests Man For Planning To Destroy “70% Of Internet”

The Federal Bureau of Investigation arrested a Texas man for planning to "kill about 70% of the internet" in a bomb attack targeted at...
Cisco Invests in Securiti to Address Edge and Multicloud security

Cisco Invests In Securiti To Address Edge And Multicloud Security

Securiti announces participation from Cisco in its latest round of funding. Securiti plans to collaborate with Cisco and help their customers address the challenge...
Cring Ransomware Attacks Industrial Firms

Cring Ransomware Attacks Industrial Firms

Kaspersky warns that Cring ransomware operators are utilizing an ancient route traversal vulnerability in the FortiOS SSL VPN web portal to get access to...
Cisco Patches tens of Vulnerabilities in SD-WAN vManage Software

Cisco Patches Tens Of Vulnerabilities In SD-WAN vManage Software

Cisco has recently declared patches for tens of vulnerabilities over its product collection that includes a crucial severity issue affecting the SD-WAN vManage software.  Traced...
Google Chrome to Block Port 10080 to Terminate NAT Slipstreaming Attacks

Google Chrome To Block Port 10080 To Terminate NAT Slipstreaming Attacks

Google Chrome is about to block HTTPS, HTTP, HTTPS, and FTP access to TCP port 10080 to stop the ports from being exploited in...
Akamai Reports Three Large-Scale DDoS Extortion Attacks

Akamai Reports Three Large-Scale DDoS Extortion Attacks

DDoS extortion attacks are getting stronger and in a recent development, Akamai has reported three large-scale DDoS extortion attacks. These attacks are amongst the...
NSA Workflow Application Emissary Reported to be Vulnerable

NSA Workflow Application Emissary Reported To Be Vulnerable

Emissary - an open-source, P2P workflow engine built by the US National Security Agency- consists vulnerabilities that threat attackers could leverage to take over...
ICS-Specific Backup Solution Vulnerabilities Open Industrial Facilities to Attack

ICS-Specific Backup Solution Vulnerabilities Open Industrial Facilities To Attack

Claroty researchers have discovered nine vulnerabilities impacting Rockwell Automation’s FactoryTalk AssetCentre - an ICS-specific backup solution. The vulnerabilities have been given the maximum CVSS...
4iQ Bags _30 Million in a Series C Funding

4iQ Bags $30 Million In A Series C Funding

4iQ, the identity-focused intelligence firm, has recently announced that it has secured $30 million in Series C funding. ForgePoint Capital and Benhamou Global Ventures...

Latest posts