Arab Security Consultants

  • Home
  • Courses
    • EC-Council Programs
    • EC-Council iWeek Courses
    • PECB
      • ISO/IEC 27001 Lead Implementer
      • ISO/IEC 27001 Lead Auditor
    • Cyber Book
  • Organized Events
    • Arab Security Conference
    • Arab Security Cyber WarGames
  • Services
    • CodeRed
    • OhPhish
    • Risk Assessment
    • Social Engineering
    • Identity & Access Security
    • Vulnerability Assessment
    • Penetration Testing
  • Training centers
  • EC-Council with ASC
  • News
  • Contact Us
  • Home
  • News
  • Archive from category "News"
  • Page 4

Category: News

FBI’s Most-Wanted Zeus and IcedID Malware Mastermind Pleads Guilty

Monday, 19 February 2024 by Ayman Hamam

A Ukrainian national has pleaded guilty in the U.S. to his role in two different malware schemes, Zeus and IcedID, between May 2009 and February 2021. Vyacheslav Igorevich Penchukov (aka Vyacheslav Igoravich Andreev, father, and tank), 37, was arrested by Swiss authorities in October 2022 and extradited to the U.S. last year. He was added to the

  • Published in News
Tagged under: Cybercrime, cyberSecurity, FBI, fraud., IcedID, Malware, money laundering, Raccoon, Ukrainian national, Zeus

Raspberry Robin Malware Upgrades with Discord Spread and New Exploits

Sunday, 11 February 2024 by Ayman Hamam

The operators of Raspberry Robin are now using two new one-day exploits to achieve local privilege escalation, even as the malware continues to be refined and improved to make it stealthier than before. This means that “Raspberry Robin has access to an exploit seller or its authors develop the exploits themselves in a short period,” Check Point

  • Published in News
Tagged under: Cyber Threats, cyberSecurity, cybersecurity trends., exploit propagation, malware evolution, Malware Tactics, Ransomware, Raspberry Robin, threat actors, vulnerability exploitation

U.S. Sanctions 6 Iranian Officials for Critical Infrastructure Cyber Attacks

Sunday, 04 February 2024 by Ayman Hamam

The U.S. Treasury Department’s Office of Foreign Assets Control (OFAC) announced sanctions against six officials associated with the Iranian intelligence agency for attacking critical infrastructure entities in the U.S. and other countries. The officials include Hamid Reza Lashgarian, Mahdi Lashgarian, Hamid Homayunfal, Milad Mansuri, Mohammad Bagher Shirinkar, and Reza Mohammad Amin Saberian, who are part

  • Published in News
Tagged under: Albania's Institute of Statistics (INSTAT), CISA (Cybersecurity and Infrastructure Security Agency), Critical Infrastructure, critical services, cyber attacks, cyber operations, cyberSecurity, Cybersecurity Threats, data theft, Homeland Justice, humanitarian consequences, industrial control systems, Iranian hacktivist persona, Iranian intelligence agency, Iranian Islamic Revolutionary Guard Corps Cyber-Electronic Command (IRGC-CEC), Iranian threat actors, Municipal Water Authority of Aliquippa, Office of Foreign Assets Control (OFAC), programmable logic controllers (PLCs), psychological operation group, sanctions, U.S. Treasury Department, unauthorized access., Unitronics, wiper malware

AllaKore RAT Malware Targeting Mexican Firms with Financial Fraud Tricks

Monday, 29 January 2024 by Ayman Hamam

Mexican financial institutions are under the radar of a new spear-phishing campaign that delivers a modified version of an open-source remote access trojan called AllaKore RAT. The BlackBerry Research and Intelligence Team attributed the activity to an unknown Latin American-based financially motivated threat actor. The campaign has been active since at least 2021. “Lures use Mexican

  • Published in News
Tagged under: AllaKore RAT, ATM security, Banking fraud, BlackBerry Research and Intelligence Team, Command-and-control (C2) server, Crypto trading platforms, CVE-2024-0176, CVE-2024-0177), Cybersecurity Threats, Delphi-based RAT, Financial institutions., Financially motivated threat actor, Geolocation confirmation, IOActive, Lamassu Douro bitcoin ATMs, Malware, Mexican Social Security Institute (IMSS), Phishing attack, Physical access, Spear-phishing campaign, Swiss company, Vulnerabilities (CVE-2024-0175

Chinese Hackers Silently Weaponized VMware Zero-Day Flaw for 2 Years

Monday, 22 January 2024 by Ayman Hamam

An advanced China-nexus cyber espionage group previously linked to the exploitation of security flaws in VMware and Fortinet appliances has been linked to the abuse of a critical vulnerability in VMware vCenter Server as a zero-day since late 2021. “UNC3886 has a track record of utilizing zero-day vulnerabilities to complete their mission without being detected,

  • Published in News
Tagged under: Chinese hackers, Cyber espionage, Cyber threat intelligence, Cybersecurity Risks, Data breach, Endpoint detection and response, Malware, Nation-state actors, Network security, Security flaws, Software updates, UNC3886, Virtualization services, VMware vCenter Server, Zero-Day Vulnerability

29-Year-Old Ukrainian Cryptojacking Kingpin Arrested for Exploiting Cloud Services

Sunday, 14 January 2024 by Ayman Hamam

Introduction A 29-year-old Ukrainian national has been apprehended in Mykolaiv, Ukraine, in connection with a highly sophisticated cryptojacking operation. The suspect allegedly earned over $2 million (€1.8 million) in illicit profits through unauthorized use of computing resources for cryptocurrency mining. The arrest was made possible through a collaborative effort between the National Police of Ukraine,

  • Published in News
Tagged under: Arrest, Cloud Service Provider, Computing Resources, Cryptocurrency Mining, Cryptojacking, Cybercrime, Cybersecurity Measures, Europol, Illicit Profits, Ukraine

Three Ways To Supercharge Your Software Supply Chain Security

Sunday, 07 January 2024 by Ayman Hamam

Section four of the “Executive Order on Improving the Nation’s Cybersecurity” introduced a lot of people in tech to the concept of a “Software Supply Chain” and securing it. If you make software and ever hope to sell it to one or more federal agencies, you have to pay attention to this. Even if you never plan

  • Published in News
Tagged under: cyberSecurity, ethical hacking, secrets management, secure coding, software composition analysis, software development, software supply chain security, supply chain resilience., vulnerability management

Double-Extortion Play Ransomware Strikes 300 Organizations Worldwide

Wednesday, 27 December 2023 by Ayman Hamam

According to a new joint cybersecurity advisory from Australia and the U.S., the threat actors behind the Play ransomware are estimated to have impacted approximately 300 entities as of October 2023. “Play ransomware actors employ a double-extortion model, encrypting systems after exfiltrating data and have impacted a wide range of businesses and critical infrastructure organizations

  • Published in News
Tagged under: cybersecurity advisory, double-extortion model, Fortinet appliances, Microsoft Exchange, phishing, Play ransomware, ransomware landscape, vulnerability exploitation

New Malvertising Campaign Distributing PikaBot Disguised as Popular Software

Sunday, 24 December 2023 by Ayman Hamam

The malware loader known as PikaBot is being distributed as part of a malvertising campaign targeting users searching for legitimate software like AnyDesk. “PikaBot was previously only distributed via malspam campaigns similarly to QakBot and emerged as one of the preferred payloads for a threat actor known as TA577,” Malwarebytes’ Jérôme Segura said. The malware family, which first appeared in early 2023,

  • Published in News
Tagged under: AnyDesk, Cyber Threats, Cybersecurity Risks, Malvertising, Malware Tactics, PikaBot, Storm-0539, Threat Cluster

Microsoft Warns of Storm-0539: The Rising Threat Behind Holiday Gift Card Frauds

Sunday, 17 December 2023 by Ayman Hamam

Microsoft is warning of an uptick in malicious activity from an emerging threat cluster it’s tracking as Storm-0539 for orchestrating gift card fraud and theft via highly sophisticated email and SMS phishing attacks against retail entities during the holiday shopping season. The goal of the attacks is to propagate booby-trapped links that direct victims to adversary-in-the-middle (AiTM)

  • Published in News
Tagged under: Credential Hygiene, Cybersecurity Threats, Email Security, Gift Card Fraud, Microsoft 365 Defender, Multi-Factor Authentication, Phishing Attacks, Retail Security, SMS Phishing, Storm-0539
  • 2
  • 3
  • 4
  • 5
  • 6
  • Home
  • Contact Us
  • Services
  • Training Centers
  • GET SOCIAL

Arab Security Consultants | Copyright © 2023 All rights reserved.

TOP