Arab Security Consultants

  • Home
  • Courses
    • EC-Council Programs
    • EC-Council iWeek Courses
    • PECB
      • ISO/IEC 27001 Lead Implementer
      • ISO/IEC 27001 Lead Auditor
    • Cyber Book
  • Organized Events
    • Arab Security Conference
    • Arab Security Cyber WarGames
  • Services
    • CodeRed
    • OhPhish
    • Risk Assessment
    • Social Engineering
    • Identity & Access Security
    • Vulnerability Assessment
    • Penetration Testing
  • Training centers
  • EC-Council with ASC
  • News
  • Contact Us
  • Home
  • Posts tagged "ASC"
  • Page 3

Tag: ASC

RedJuliett Cyber Espionage Campaign Hits 75 Taiwanese Organizations

Tuesday, 25 June 2024 by Ayman Hamam

A likely China-linked state-sponsored threat actor has been linked to a cyber espionage campaign targeting government, academic, technology, and diplomatic organizations in Taiwan between November 2023 and April 2024. Recorded Future’s Insikt Group is tracking the activity under the name RedJuliett, describing it as a cluster that operates in Fuzhou, China, to support Beijing’s intelligence

  • Published in News
Tagged under: academic cyber attacks, Arab Security Consultants, ASC, China-linked threat actor, Cyber espionage, Cyber Security, cyber threat analysis, diplomatic espionage, intelligence collection, RedJuliett, Taiwan government hacking, technology sector threats
Hugging Face logo with a lock symbol indicating a security breach on the Spaces platform

AI Company Hugging Face Detects Unauthorized Access to Its Spaces Platform

Monday, 03 June 2024 by Ayman Hamam

Artificial Intelligence (AI) company Hugging Face on Friday disclosed that it detected unauthorized access to its Spaces platform earlier this week. “We have suspicions that a subset of Spaces’ secrets could have been accessed without authorization,” it said in an advisory. Spaces offers a way for users to create, host, and share AI and machine learning (ML) applications. It also

  • Published in News
Tagged under: AI app secrets, AI security breach, AIaaS providers, Arab Security Consultants, ASC, cyberSecurity, data protection, Hugging Face, security advisory, Spaces platform, token refresh, unauthorized access.

Experts Find Flaw in Replicate AI Service Exposing Customers’ Models and Data

Wednesday, 29 May 2024 by Ayman Hamam

Cybersecurity researchers have discovered a critical security flaw in artificial intelligence (AI)-)-as-a-service provider Replicate that could have allowed threat actors to gain access to proprietary AI models and sensitive information. “Exploitation of this vulnerability would have allowed unauthorized access to the AI prompts and results of all Replicate’s platform customers,” cloud security firm Wiz said in a report

  • Published in News
Tagged under: AI security, AI-as-a-service, Arab Security Consultants, ASC, cross-tenant attacks, Cyber Security News, cyberSecurity, Hacker News, proprietary AI models, remote code execution, Replicate vulnerability, sensitive information

Kinsing Hacker Group Exploits More Flaws to Expand Botnet for Cryptojacking

Sunday, 19 May 2024 by Ayman Hamam

The crypto-jacking group known as Kinsing has demonstrated an ability to continuously evolve and adapt, proving to be a persistent threat by swiftly integrating newly disclosed vulnerabilities into the exploit arsenal and expanding its botnet. The findings come from cloud security firm Aqua, which described the threat actor as actively orchestrating illicit cryptocurrency mining campaigns since 2019.

  • Published in News
Tagged under: Arab Security Consultants, ASC, botnet expansion, cloud security, cryptocurrency mining malware, Cybersecurity Threats, Kinsing crypto-jacking, Linux, malware prevention, vulnerability exploitation, Windows attacks

FIN7 Hacker Group Leverages Malicious Google Ads to Deliver NetSupport RAT

Sunday, 12 May 2024 by Ayman Hamam

The financially motivated threat actor known as FIN7 has been observed leveraging malicious Google ads spoofing legitimate brands as a means to deliver MSIX installers that culminate in the deployment of NetSupport RAT. “The threat actors used malicious websites to impersonate well-known brands, including AnyDesk, WinSCP, BlackRock, Asana, Concur, The Wall Street Journal, Workable, and

  • Published in News
Tagged under: ArabSecurityConsultants, ASC, Brand Impersonation, Cybercrime Tactics, Cybersecurity News., Cybersecurity Threats, FIN7, Malicious Google Ads, Malware Distribution, NetSupport RAT, Phishing Techniques

Hackers Using Cracked Software on GitHub to Spread RisePro Info Stealer

Monday, 18 March 2024 by Ayman Hamam

Cybersecurity researchers have found several GitHub repositories offering cracked software that is used to deliver an information stealer called RisePro. The campaign, codenamed gitgub, includes 17 repositories associated with 11 different accounts, according to G DATA. The repositories in question have since been taken down by the Microsoft-owned subsidiary. “The repositories look similar, featuring a README.md

  • Published in News
Tagged under: and digital threats., Arab Security Consultants, ASC, cracked software, cyberSecurity, data breaches, data exfiltration, Gitgub campaign, GitHub repositories, information stealer, Malware Distribution, password theft, PrivateLoader, Raccoon, Ransomware, RedLine, RisePro, Snake Keylogger, Specops report, stealer malware, Telegram channels, Vidar

U.S. Court Orders NSO Group to Hand Over Pegasus Spyware Code to WhatsApp

Monday, 04 March 2024 by Ayman Hamam

A U.S. judge has ordered NSO Group to hand over its source code for Pegasus and other products to Meta as part of the social media giant’s ongoing litigation against the Israeli spyware vendor. The decision marks a major legal victory for Meta, which filed the lawsuit in October 2019 for using its infrastructure to distribute the spyware to approximately 1,400 mobile

  • Published in News
Tagged under: ArabSecurityConsultants, ASC, consumer rights., cyberSecurity, CyberSecuritynews, digital rights, GDPR, infrastructure, litigation, Meta, NSO Group, Pegasus, Predator, privacy, privacy fee, spyware, subscription model, surveillance

Microsoft Expands Free Logging Capabilities for all U.S. Federal Agencies

Sunday, 25 February 2024 by Ayman Hamam

Microsoft has expanded free logging capabilities to all U.S. federal agencies using Microsoft Purview Audit irrespective of the license tier, more than six months after a China-linked cyber espionage campaign targeting two dozen organizations came to light. “Microsoft will automatically enable the logs in customer accounts and increase the default log retention period from 90

  • Published in News
Tagged under: Arab Security Consultants, ASC, Azure Active Directory, China-linked, Cyber espionage, Cyber Security, cyberSecurity, Data breach, logging capabilities, Microsoft 365, Microsoft Purview Audit, state-sponsored actors., Storm-0558, U.S. federal agencies

Agent Racoon Backdoor Targets Organizations in Middle East, Africa, and U.S.

Sunday, 03 December 2023 by Ayman Hamam

In a recent analysis, Palo Alto Networks Unit 42 researcher Chema Garcia revealed a targeted cyber threat affecting organizations in the Middle East, Africa, and the United States. The unknown threat actor is distributing a sophisticated backdoor named Agent Racoon, developed using the .NET framework. The malware exploits the domain name service (DNS) protocol to

  • Published in News
Tagged under: Africa, AgentRacoon, ASC, Backdoor, cyberSecurity, CyberThreat, DataExfiltration, DataSecurity, DNSProtocol, Egypt, HackerNews, InfoSec, ITSecurity, Malware, MiddleEast, Mimikatz, Ntospy, PaloAltoNetworks, SecurityAlert, TechNews, ThreatAnalysis, Unit42, US
  • 1
  • 2
  • 3
  • Home
  • Contact Us
  • Services
  • Training Centers
  • GET SOCIAL

Arab Security Consultants | Copyright © 2023 All rights reserved.

TOP