Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Posts

The AMD Data Breach: Cyber Threats and Dark Web Activity

Recently, our team at Foresiet Threat Intelligence detected a significant data breach affecting AMD, a prominent computing company. This breach, orchestrated by the renowned dark web threat actor IntelBroker. The breach, uncovered by the Foresight Threat Intelligence Team, revealed a vast array of compromised data, including details on future products, spec sheets, employee and customer databases, property files, ROMs, source code, firmware, and financial records. The Dark Web Connection.

FBI Recovers 7,000 LockBit Decryption Keys, Urges Ransomware Victims to Come Forward

The FBI has made a significant breakthrough in the fight against LockBit ransomware by recovering over 7,000 decryption keys, which can now be used by victims to restore their encrypted data at no cost. FBI's Efforts Against LockBit Ransomware During the 2024 Boston Conference on Cyber Security, FBI Cyber Division Assistant Director Bryan Vorndran announced the recovery of these keys, emphasizing the agency's commitment to assisting past LockBit victims.

Snowflake Data Breach: 165 Customers' Information Exposed in Ongoing Extortion Campaign

Recent reports reveal that up to 165 customers of Snowflake, a prominent cloud data warehousing platform, have fallen victim to a sophisticated data breach and extortion campaign. This ongoing operation, identified by cybersecurity firm Mandiant as UNC5537, underscores broader implications for cybersecurity practices in cloud environments. Understanding the UNC5537 Campaign.

VMware ESXi Systems with Admin Rights Targeted by New Mallox Ransomware Variant

Novel Attack Vector Uses Custom Shell for Payload Delivery and Execution A fresh variant of the Mallox ransomware has emerged, specifically targeting VMware ESXi environments with administrative privileges. This advanced attack method, discovered by researchers at Trend Micro, demonstrates the evolving sophistication of ransomware tactics. Mallox Ransomware: An Overview Mallox, also known as Fargo and Tohnichi, first emerged in June 2021.

Securing Docker Containers: Strategies to Prevent Commando Cat Attacks

Cybercriminals have been exploiting misconfigured Docker containers to deploy cryptocurrency mining software, and a particularly aggressive campaign dubbed "Commando Cat" has been at the forefront since early this year. This trend highlights the growing threat of cryptojacking through container misconfigurations. How Cybercriminals Exploit Docker Containers Containers have revolutionized how organizations deploy and manage applications, but they have also provided new opportunities for cyberattackers.

Heightened Exploit Attempts on Check Point's Recent VPN Zero-Day Vulnerability

A significant surge in exploitation attempts targeting a newly disclosed information disclosure flaw in Check Point's VPN technology has been observed recently. This has underscored the urgent need for organizations to address the vulnerability immediately.

Security Flaws Discovered in Popular WooCommerce Plugin

Patchstack has recently identified multiple security vulnerabilities in the WooCommerce Amazon Affiliates (WZone) plugin. Created by AA-Team, this widely-used premium WordPress plugin has garnered significant popularity, amassing over 35,000 sales. It serves as a crucial asset for website owners and bloggers aiming to monetize their sites through the Amazon affiliate program.

Expanding Cyber Threats: Sticky Werewolf Targets Russia and Belarus

The cyber threat landscape is constantly evolving, with new threat actors emerging and expanding their targets. Cybersecurity researchers have recently revealed information about a threat actor named Sticky Werewolf, who has been associated with cyber attacks on organizations in Russia and Belarus. This development highlights the critical need for robust cybersecurity measures, including stolen credentials detection, darknet monitoring services, and dark web surveillance.

Massive Data Leak Targets New York Times: Implications and Cybersecurity Insights

In a startling cybersecurity development, an anonymous threat actor has posted what they claim to be 270GB of source code stolen from the New York Times on a popular imageboard website. This incident, reported on Friday, suggests the leak contains "basically all source code" from the publisher.

Surge in CatDDoS Attacks: Exploiting Vulnerabilities to Spread Mirai Variant

The cybersecurity landscape has recently been shaken by a surge in activity involving a Mirai distributed denial-of-service (DDoS) botnet variant known as CatDDoS. Over the past three months, threat actors have aggressively exploited more than 80 vulnerabilities to spread this malware. In this blog, we explore the recent CatDDoS attacks, the targeted sectors, and the implications for cybersecurity practices.