February 2020

CISA and FBI reports new North Korean malicious cyber activity (6 new malware reports)

The Cybersecurity and Infrastructure Security Agency (CISA) and the Federal Bureau of Investigation (FBI) released six new malware reports on malicious cyber activity from North Korea.

CISA and FBI reports new North Korean malicious cyber activity (6 new malware reports) Read More »

Loda RAT malware campaign

Security experts have spotted a new malware campaign that uses a new version of Loda remote access trojan (RAT). Cisco’s Talos security group observed over the past few months websites hosting a new version of Loda written in AutoIT. Loda was first discovered in 2017 and has been used for spying on victims. According to

Loda RAT malware campaign Read More »

Microsoft February 2020 Security Updates (includes IE zero-day fix)

Microsoft issued the February 2020 Security Updates that include 101 unique vulnerability fixes, 13 of those rated critical. The update also includes a patch for an IE zero-day scripting engine vulnerability CVE-2020-0674 disclosed in January.

Microsoft February 2020 Security Updates (includes IE zero-day fix) Read More »

NSA: Guidance to mitigate cloud vulnerabilities

The National Security Agency (NSA) has released guidelines to help organizations mitigate cloud vulnerabilities. The NSA document includes four classes of vulnerabilities at most risk to threat actors.

NSA: Guidance to mitigate cloud vulnerabilities Read More »

Google releases Chrome 80

Google has released Chrome 80 (version 80.0.3987.87) for Windows, Mac and Linux. The update includes a number of fixes and improvements in the popular browser. The company also added a Chrome browser update for Android.

Google releases Chrome 80 Read More »

Threat actors are launching web shell attacks

Security experts from Microsoft have revealed threat actors are increasingly using web shell attacks in their campaigns. Microsoft’s investigation revealed actors such as ZINC, KRYPTON, and GALLIUM, exploit known vulnerabilities to implant web shells on internet-facing web servers.

Threat actors are launching web shell attacks Read More »