Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Detecting The Agent Tesla Malware Family

Welcome to the latest from Corelight Labs! This blog continues our tradition of picking a popular malware family from Any.Run and writing a detector for it! Trending consistently at #1 on Any.Run’s malware trends list, Agent Tesla uses multiple protocols to communicate with its C2 infrastructure, making it more difficult to detect robustly than a malware sample utilizing only one network protocol for its C2.

CVE-2024-3937: Maximum Severity Authentication Bypass Vulnerability in Juniper Routers

On June 28, 2024, Juniper released fixes for a critical authentication bypass vulnerability discovered during internal testing, CVE-2024-3937. Juniper has stated that this vulnerability affects only Session Smart Router (SSR), Session Smart Conductor, and WAN Assurance Router products running in high-availability redundant configurations.

Navigating the Cybersecurity Landscape: A Deep Dive into Effective SIEM Strategies

Comprehending and effectively addressing cybersecurity threats is paramount to organizational security. As artificial intelligence continues to evolve, how companies respond to cybersecurity threats and how they take proactive steps to mitigate them will factor heavily into profitability, reputation and long-term success.

Mary Calam Joins The Cyber Helpline as Trustee

Mary had a long career in the UK government, working in senior roles in a range of agencies across counter terrorism, national security and law enforcement, including the Independent Police Complaints Commission and the Serious Organised Crime Agency. Her last executive role was as Director General for Crime, Policing and Fire in the Home Office.

Improving Patch and Vulnerability Management with Proactive Security Analysis

Vulnerability management is the continuous process of identifying and addressing vulnerabilities in an organization’s IT infrastructure, while patch management is the process of accessing, testing, and installing patches that fix bugs or address known security vulnerabilities in software applications. Vulnerability management and patch management are crucial SecOps processes that protect IT assets against cyber threats and prevent unauthorized access to secure systems.

New Malware Campaign Impersonates AI Tools To Trick Users

Researchers at ESET warn that malvertising campaigns are impersonating AI tools to trick users into installing malware. The Rilide infostealer, for example, is being distributed via a malicious browser extension posing as Sora or Gemini. “In the case of the malicious browser extension, it is delivered to victims who have been duped into clicking on malicious ads, typically on Facebook, that promise the services of a generative AI model,” the researchers write.

The Curious Case of the Payroll Pilfering

In a world where cyber espionage has become as common as a rainy day in London, the recent events surrounding the UK armed forces' payroll database have had us all raising our eyebrows higher than a butler's in a posh British drama. The plot twists in the world of cybersecurity often reminds me of a Bond film, albeit with fewer martinis and more malware.

June Release Rollup: Egnyte for Microsoft (MS) Teams - Drag and Drop Functionality, Enhancements to Document Room Portal and More

This month's product updates and enhancements rollup includes Egnyte for MS Teams - Drag and Drop functionality, enhancements to the Document Room Portal, and user management on the Android mobile app. Please visit the articles linked below for more details.