Phishing Campaign Uses Microsoft Office Docs to Spread NetSupport RAT – Source: heimdalsecurity.com

Source: heimdalsecurity.com – Author: Livia Gyongyoși Malicious Emails Were Send Through Legitimate Email Marketing Delivery Platform. Last updated on March 20, 2024 Hackers use phishing techniques to deploy NetSupport RAT through Microsoft Office documents....

NIST’s National Vulnerability Database Put CVE Enrichment on Hold – Source: heimdalsecurity.com

Source: heimdalsecurity.com – Author: Livia Gyongyoși NIST’s National Vulnerability Database (NVD) stopped enriching with information most of the CVEs they register. Although they also consider other factors when deciding what to patch first, companies worldwide rely...

Python Snake Info Stealer Spreading Via Facebook Messages – Source: securityboulevard.com

Source: securityboulevard.com – Author: Wajahat Raja As per recent reports, threat actors are increasingly leveraging Facebook messages to distribute the Python Snake Info Stealer malware. Researchers have noticed that threat actors are using three variants of the...

CISA Launches Repository for Software Attestation and Artifacts to Strengthen Federal Cybersecurity Efforts

The Cybersecurity and Infrastructure Security Agency (CISA) has taken a significant step towards fortifying the cybersecurity of federal systems with the announcement of the Repository for Software Attestation and Artifacts. This platform allows software producers...

Researchers Disclose Proof of Concept for New GhostRace Attack – Source: heimdalsecurity.com

Source: heimdalsecurity.com – Author: Livia Gyongyoși IBM and VU Amsterdam University researchers published on March 12th their study about the new GhostRace attack type. Apart from the technical paper, blog post and Proof of Concept (PoC) exploit, they also released...