Arab Security Consultants

  • Home
  • Courses
    • EC-Council Programs
    • EC-Council iWeek Courses
    • PECB
      • ISO/IEC 27001 Lead Implementer
      • ISO/IEC 27001 Lead Auditor
    • Cyber Book
  • Organized Events
    • Arab Security Conference
    • Arab Security Cyber WarGames
  • Services
    • CodeRed
    • OhPhish
    • Risk Assessment
    • Social Engineering
    • Identity & Access Security
    • Vulnerability Assessment
    • Penetration Testing
  • Training centers
  • EC-Council with ASC
  • News
  • Contact Us
  • Home
  • News
  • Archive from category "News"
  • Page 3

Category: News

RedJuliett Cyber Espionage Campaign Hits 75 Taiwanese Organizations

Tuesday, 25 June 2024 by Ayman Hamam

A likely China-linked state-sponsored threat actor has been linked to a cyber espionage campaign targeting government, academic, technology, and diplomatic organizations in Taiwan between November 2023 and April 2024. Recorded Future’s Insikt Group is tracking the activity under the name RedJuliett, describing it as a cluster that operates in Fuzhou, China, to support Beijing’s intelligence

  • Published in News
Tagged under: academic cyber attacks, Arab Security Consultants, ASC, China-linked threat actor, Cyber espionage, Cyber Security, cyber threat analysis, diplomatic espionage, intelligence collection, RedJuliett, Taiwan government hacking, technology sector threats
Hugging Face logo with a lock symbol indicating a security breach on the Spaces platform

AI Company Hugging Face Detects Unauthorized Access to Its Spaces Platform

Monday, 03 June 2024 by Ayman Hamam

Artificial Intelligence (AI) company Hugging Face on Friday disclosed that it detected unauthorized access to its Spaces platform earlier this week. “We have suspicions that a subset of Spaces’ secrets could have been accessed without authorization,” it said in an advisory. Spaces offers a way for users to create, host, and share AI and machine learning (ML) applications. It also

  • Published in News
Tagged under: AI app secrets, AI security breach, AIaaS providers, Arab Security Consultants, ASC, cyberSecurity, data protection, Hugging Face, security advisory, Spaces platform, token refresh, unauthorized access.

Experts Find Flaw in Replicate AI Service Exposing Customers’ Models and Data

Wednesday, 29 May 2024 by Ayman Hamam

Cybersecurity researchers have discovered a critical security flaw in artificial intelligence (AI)-)-as-a-service provider Replicate that could have allowed threat actors to gain access to proprietary AI models and sensitive information. “Exploitation of this vulnerability would have allowed unauthorized access to the AI prompts and results of all Replicate’s platform customers,” cloud security firm Wiz said in a report

  • Published in News
Tagged under: AI security, AI-as-a-service, Arab Security Consultants, ASC, cross-tenant attacks, Cyber Security News, cyberSecurity, Hacker News, proprietary AI models, remote code execution, Replicate vulnerability, sensitive information

Kinsing Hacker Group Exploits More Flaws to Expand Botnet for Cryptojacking

Sunday, 19 May 2024 by Ayman Hamam

The crypto-jacking group known as Kinsing has demonstrated an ability to continuously evolve and adapt, proving to be a persistent threat by swiftly integrating newly disclosed vulnerabilities into the exploit arsenal and expanding its botnet. The findings come from cloud security firm Aqua, which described the threat actor as actively orchestrating illicit cryptocurrency mining campaigns since 2019.

  • Published in News
Tagged under: Arab Security Consultants, ASC, botnet expansion, cloud security, cryptocurrency mining malware, Cybersecurity Threats, Kinsing crypto-jacking, Linux, malware prevention, vulnerability exploitation, Windows attacks

FIN7 Hacker Group Leverages Malicious Google Ads to Deliver NetSupport RAT

Sunday, 12 May 2024 by Ayman Hamam

The financially motivated threat actor known as FIN7 has been observed leveraging malicious Google ads spoofing legitimate brands as a means to deliver MSIX installers that culminate in the deployment of NetSupport RAT. “The threat actors used malicious websites to impersonate well-known brands, including AnyDesk, WinSCP, BlackRock, Asana, Concur, The Wall Street Journal, Workable, and

  • Published in News
Tagged under: ArabSecurityConsultants, ASC, Brand Impersonation, Cybercrime Tactics, Cybersecurity News., Cybersecurity Threats, FIN7, Malicious Google Ads, Malware Distribution, NetSupport RAT, Phishing Techniques

Vultur Android Banking Trojan Returns with Upgraded Remote Control Capabilities

Monday, 22 April 2024 by Ayman Hamam

The Android banking trojan known as Vultur has resurfaced with a suite of new features and improved anti-analysis and detection evasion techniques, enabling its operators to remotely interact with a mobile device and harvest sensitive data. “Vultur has also started masquerading more of its malicious activity by encrypting its C2 communication, using multiple encrypted payloads

  • Published in News
Tagged under: Android banking trojan, Cybersecurity Threats, malware distribution techniques, mobile banking fraud, mobile device security, remote device control, SMS Phishing, Vultur malware

Hackers Using Cracked Software on GitHub to Spread RisePro Info Stealer

Monday, 18 March 2024 by Ayman Hamam

Cybersecurity researchers have found several GitHub repositories offering cracked software that is used to deliver an information stealer called RisePro. The campaign, codenamed gitgub, includes 17 repositories associated with 11 different accounts, according to G DATA. The repositories in question have since been taken down by the Microsoft-owned subsidiary. “The repositories look similar, featuring a README.md

  • Published in News
Tagged under: and digital threats., Arab Security Consultants, ASC, cracked software, cyberSecurity, data breaches, data exfiltration, Gitgub campaign, GitHub repositories, information stealer, Malware Distribution, password theft, PrivateLoader, Raccoon, Ransomware, RedLine, RisePro, Snake Keylogger, Specops report, stealer malware, Telegram channels, Vidar

Microsoft Confirms Russian Hackers Stole Source Code, Some Customer Secrets

Monday, 11 March 2024 by Ayman Hamam

Microsoft on Friday revealed that the Kremlin-backed threat actor known as Midnight Blizzard (aka APT29 or Cozy Bear) managed to gain access to some of its source code repositories and internal systems following a hack that came to light in January 2024. “In recent weeks, we have seen evidence that Midnight Blizzard is using information initially exfiltrated from our

  • Published in News
Tagged under: APT29, breach, Cozy Bear, cyberattack, cyberSecurity, Microsoft, Midnight Blizzard, nation-state threat, Russia, source code

U.S. Court Orders NSO Group to Hand Over Pegasus Spyware Code to WhatsApp

Monday, 04 March 2024 by Ayman Hamam

A U.S. judge has ordered NSO Group to hand over its source code for Pegasus and other products to Meta as part of the social media giant’s ongoing litigation against the Israeli spyware vendor. The decision marks a major legal victory for Meta, which filed the lawsuit in October 2019 for using its infrastructure to distribute the spyware to approximately 1,400 mobile

  • Published in News
Tagged under: ArabSecurityConsultants, ASC, consumer rights., cyberSecurity, CyberSecuritynews, digital rights, GDPR, infrastructure, litigation, Meta, NSO Group, Pegasus, Predator, privacy, privacy fee, spyware, subscription model, surveillance

Microsoft Expands Free Logging Capabilities for all U.S. Federal Agencies

Sunday, 25 February 2024 by Ayman Hamam

Microsoft has expanded free logging capabilities to all U.S. federal agencies using Microsoft Purview Audit irrespective of the license tier, more than six months after a China-linked cyber espionage campaign targeting two dozen organizations came to light. “Microsoft will automatically enable the logs in customer accounts and increase the default log retention period from 90

  • Published in News
Tagged under: Arab Security Consultants, ASC, Azure Active Directory, China-linked, Cyber espionage, Cyber Security, cyberSecurity, Data breach, logging capabilities, Microsoft 365, Microsoft Purview Audit, state-sponsored actors., Storm-0558, U.S. federal agencies
  • 1
  • 2
  • 3
  • 4
  • 5
  • Home
  • Contact Us
  • Services
  • Training Centers
  • GET SOCIAL

Arab Security Consultants | Copyright © 2023 All rights reserved.

TOP