Four Critical Ivanti CSA Vulnerabilities Exploited, CISA and FBI Urge Mitigation
The Cybersecurity and Infrastructure Security Agency (CISA) and the FBI have issued a joint advisory regarding the active exploitation of four critical vulnerabilities in Ivanti Cloud Service Appliances. These include CVE-2024-8963, CVE-2024-9379, CVE-2024-8190, and CVE-2024-9380, which can lead to unauthorized access, remote code execution, and credential theft.…
Read More

Victim: Rees NDT Inspection Services Country : CA Actor: ElDorado Source: Discovered: 2025-01-22 22:48:37.149402 Published: 2025-01-22 22:48:37.149402 Description : Industry: Energy, Utilities & Waste Location: Canada Employee Count: < 25 Employees Service Area: Northwestern Canada (Grande Prairie, Bonnyville, Vegreville, and mobile units) Specialization: Inspection and engineering certification of overhead lifting devices Equipment Covered: Cranes, pickers, sideboom pipelayers, and oilfield-related lifting equipment Revenue: < Million

About Country CA (Canada)

– Cybersecurity Framework: Canada has established a comprehensive cybersecurity framework, including the National Cyber Security Strategy aimed at safeguarding the nation’s digital infrastructure.…

Read More
Cyber Insights 2025: APIs – The Threat Continues
Summary: SecurityWeek’s Cyber Insights 2025 highlights expert predictions regarding the increasing vulnerabilities associated with APIs as their usage expands. As organizations adopt more SaaS applications and AI-driven tools, APIs are becoming prime targets for cybercriminals, leading to a significant rise in API-related breaches. Experts emphasize the urgent need for improved API security measures to combat these evolving threats.…
Read More
Mandatory MFA, Biometrics Make Headway in Middle East, Africa
Summary: National governments and companies in the Middle East and Africa are increasingly adopting digital identity systems to enhance security and reduce cybercrime. With millions enrolled in biometric-based identity platforms, these regions are leveraging technology to improve authentication processes. Despite the rising cyber risks, investment in identity and access management technologies remains low compared to other cybersecurity priorities.…
Read More

Victim: JOMARSOFTCORP.COM Country : Actor: clop Source: http://santat7kpllt6iyvqbr7q4amdv6dzrh6paatvyrzl7ry3zm72zigf4ad.onion/jomarsoftcorp-com Discovered: 2025-01-22 05:53:03.558179 Published: 2025-01-22 05:53:03.558179 Description : Company Name: JOMARSOFTCORP.COM Services Offered: Software and IT services Specializations: Custom software development, mobile app development Focus: Understanding specific business needs Benefits: Automating processes, increasing efficiency, driving growth Industries Served: Various sectors Goal: Assisting businesses in achieving technology objectives

About Country: Cybersecurity Perspective and Ransomware Cases

– Cybersecurity Framework: The country has established a national cybersecurity strategy that focuses on enhancing resilience against cyber threats and improving response mechanisms.…

Read More
Supercharge Your CTI: AI-Powered IOC Collection with ChatGPT, Inoreader and Google Drive
This article outlines a proof-of-concept for automating the collection and processing of Indicators of Compromise (IOCs) using Inoreader, Google Drive, and OpenAI’s GPT-4. The workflow aims to enhance the efficiency of Cyber Threat Intelligence (CTI), Incident Response (IR), and Security Operations Center (SOC) teams by transforming raw data into actionable insights.…
Read More
Critical Mozilla Vulnerabilities Prompt Urgent Updates for Firefox and Thunderbird Users
Mozilla Firefox and Thunderbird users are facing critical vulnerabilities that could result in arbitrary code execution and system instability. The Indian Computer Emergency Response Team (CERT-In) has issued an advisory urging immediate software updates to mitigate these risks. Affected: Mozilla Firefox, Mozilla Thunderbird

Keypoints :

High-severity vulnerabilities found in Mozilla Firefox and Thunderbird.…
Read More

Victim: solge.es Country : ES Actor: safepay Source: http://nz4z6ruzcekriti5cjjiiylzvrmysyqwibxztk6voem4trtx7gstpjid.onion#solge Discovered: 2025-01-21 23:09:03.948527 Published: 2025-01-21 23:09:03.948527 Description : Spanish-based Information Technology company Focus on mobile application development Expertise in web design Specializes in digital marketing Aims to enhance enterprise effectiveness Offers comprehensive IT solutions Provides digital marketing strategies Includes training and consultancy services Expert guidance in web design and digital marketing

About Country ES

– Geopolitical Status: Country ES is strategically positioned in Europe, which influences its cybersecurity landscape, given the region’s focus on collaborative security measures.…

Read More
Researchers Found New Android Malware Linked to DoNot Team APT Group
Summary: CYFIRMA researchers have linked a newly discovered Android malware named “Tanzeem” to the Indian APT group DoNot Team, which has been active since 2016. This malware targets government and military organizations in South Asia and utilizes the OneSignal platform to deliver phishing links. The evolving tactics of the DoNot APT group signify a persistent threat to regional cybersecurity.…
Read More
InvisibleFerret Malware: Technical Analysis
The article discusses the emergence of InvisibleFerret malware, which is being spread through fake job interviews targeting developers in the tech and cryptocurrency sectors. This malware is part of a broader campaign that includes other malware like BeaverTail. InvisibleFerret is designed to steal sensitive information and operates silently, making it difficult to detect.…
Read More
Washington Man Admits to Role in Multiple Cybercrime, Fraud Schemes
Summary: Marco Raquan Honesty, a 28-year-old from Washington, has pleaded guilty to multiple fraud schemes resulting in over $600,000 in losses. His criminal activities included COVID relief fraud, smishing scams, and bank account takeovers, among others. Investigators seized numerous devices and materials related to his fraudulent operations during a search of his residence.…
Read More
Unsecured Tunneling Protocols Expose 4.2 Million Hosts, Including VPNs and Routers
Summary: Recent research has identified significant security vulnerabilities in various tunneling protocols, potentially allowing attackers to hijack internet hosts for anonymous attacks. Approximately 4.2 million hosts, including VPN servers and routers, are at risk, particularly in countries like China, France, and the U.S. Exploiting these vulnerabilities could enable attackers to conduct denial-of-service (DoS) attacks and access private networks.…
Read More
Star Blizzard hackers abuse WhatsApp to target high-value diplomats
Summary: Russian nation-state actor Star Blizzard has initiated a spear-phishing campaign targeting WhatsApp accounts of individuals in government, diplomacy, and organizations related to Ukraine aid. This campaign marks a tactical shift following the exposure of their previous methods, utilizing social engineering techniques to compromise accounts without malware.…
Read More
FCC orders telecoms to secure their networks after Salt Tyhpoon hacks
Summary: The FCC has mandated U.S. telecommunications carriers to enhance their cybersecurity measures following the Salt Typhoon breaches that compromised multiple networks. This ruling requires telecom companies to secure their systems against cyberattacks and submit annual certifications of their cybersecurity risk management plans. The action aims to address vulnerabilities exposed by the breaches attributed to a Chinese hacking group, emphasizing the urgent need for improved defenses against nation-state threats.…
Read More
US issues sanctions against companies in Laos, China tied to North Korean IT worker scheme
Summary: The U.S. has imposed sanctions on two North Korean nationals and several companies in Laos and China for facilitating a scheme that deceived American firms into hiring North Korean IT workers, whose earnings fund the DPRK’s weapons programs. The Treasury Department highlighted the extensive network of North Korean IT workers operating globally, often using stolen identities to conceal their activities.…
Read More