Arab Security Consultants

  • Home
  • Courses
    • EC-Council Programs
    • EC-Council iWeek Courses
    • PECB
      • ISO/IEC 27001 Lead Implementer
      • ISO/IEC 27001 Lead Auditor
    • Cyber Book
  • Organized Events
    • Arab Security Conference
    • Arab Security Cyber WarGames
  • Services
    • CodeRed
    • OhPhish
    • Risk Assessment
    • Social Engineering
    • Identity & Access Security
    • Vulnerability Assessment
    • Penetration Testing
  • Training centers
  • EC-Council with ASC
  • News
  • Contact Us
  • Home
  • Posts tagged "vulnerability exploitation"

Tag: vulnerability exploitation

OilRig Exploits Windows Kernel Flaw in Espionage Campaign Targeting UAE and Gulf

Tuesday, 15 October 2024 by Ayman Hamam

The Iranian threat actor known as OilRig has been observed exploiting a now-patched privilege escalation flaw impacting the Windows Kernel as part of a cyber espionage campaign targeting the U.A.E. and the broader Gulf region. “The group utilizes sophisticated tactics that include deploying a backdoor that leverages Microsoft Exchange servers for credentials theft, and exploiting vulnerabilities like

  • Published in News
Tagged under: APT34, credentials theft, CVE-2024-30088, Cyber espionage, cyberattack, Earth Simnavaz, Gulf region, Malware, Microsoft Exchange, OilRig, privilege escalation, psgfilter.dll, STEALHOOK, U.A.E., vulnerability exploitation, Windows Kernel

Kinsing Hacker Group Exploits More Flaws to Expand Botnet for Cryptojacking

Sunday, 19 May 2024 by Ayman Hamam

The crypto-jacking group known as Kinsing has demonstrated an ability to continuously evolve and adapt, proving to be a persistent threat by swiftly integrating newly disclosed vulnerabilities into the exploit arsenal and expanding its botnet. The findings come from cloud security firm Aqua, which described the threat actor as actively orchestrating illicit cryptocurrency mining campaigns since 2019.

  • Published in News
Tagged under: Arab Security Consultants, ASC, botnet expansion, cloud security, cryptocurrency mining malware, Cybersecurity Threats, Kinsing crypto-jacking, Linux, malware prevention, vulnerability exploitation, Windows attacks

Raspberry Robin Malware Upgrades with Discord Spread and New Exploits

Sunday, 11 February 2024 by Ayman Hamam

The operators of Raspberry Robin are now using two new one-day exploits to achieve local privilege escalation, even as the malware continues to be refined and improved to make it stealthier than before. This means that “Raspberry Robin has access to an exploit seller or its authors develop the exploits themselves in a short period,” Check Point

  • Published in News
Tagged under: Cyber Threats, cyberSecurity, cybersecurity trends., exploit propagation, malware evolution, Malware Tactics, Ransomware, Raspberry Robin, threat actors, vulnerability exploitation

Double-Extortion Play Ransomware Strikes 300 Organizations Worldwide

Wednesday, 27 December 2023 by Ayman Hamam

According to a new joint cybersecurity advisory from Australia and the U.S., the threat actors behind the Play ransomware are estimated to have impacted approximately 300 entities as of October 2023. “Play ransomware actors employ a double-extortion model, encrypting systems after exfiltrating data and have impacted a wide range of businesses and critical infrastructure organizations

  • Published in News
Tagged under: cybersecurity advisory, double-extortion model, Fortinet appliances, Microsoft Exchange, phishing, Play ransomware, ransomware landscape, vulnerability exploitation
  • Home
  • Contact Us
  • Services
  • Training Centers
  • GET SOCIAL

Arab Security Consultants | Copyright © 2023 All rights reserved.

TOP