A newly discovered, sophisticated threat group that targets organizations without DMARC implemented and relies on business email compromise is heralding what researchers call "a new age" of business email compromise. The group, called Cosmic Lynx, is the first reported Russian BEC cybercriminal ring, and it's bringing the once run-of-the-mill email scam attack vector to the next level. The group has been associated with more than 200 BEC campaigns targeting senior-level executives in 46 countries since last July. READ MORE...
An unpatched and previously unknown security vulnerability has been discovered in the Zoom Client for Windows, affecting computers running Windows 7 and older OS versions. The vulnerability enables a remote attacker to execute arbitrary code on a victim's machine where Zoom Client for Windows - any supported version - is installed. The flaw could be exploited by tricking a user into performing a typical action, such as opening a document file. READ MORE...
The notorious TrickBot malware mistakenly left a test module that is warning victims that they are infected and should contact their administrator. TrickBot is a malware infection that is commonly distributed via malicious spam emails. When installed, the malware will run quietly on a victim's machine while it downloads various modules that perform different tasks on the infected computer. READ MORE...
Security researchers have discovered backdoors impacting a total of 29 Fiber-To-The-Home (FTTH) Optical Line Terminal (OLT) devices from Chinese vendor C-Data. The company's OLTs are available for purchase under various brands, including BLIY, OptiLink, V-SOL CN, and C-Data, delivering connectivity to numerous clients (up to 1024 in some cases), with some of the affected devices even supporting multiple 10-gigabit uplinks. READ MORE...
A popular consumer-grade security camera made by TP-Link and sold under the Kasa brand has bevy of bugs that open the hardware to remote attacks, such as giving hackers access to private video feeds and the ability to change device settings. The researcher Jason Kent, with Cequence Security, reported the flaws to TP-Link on March 2. On Thursday, the researcher publicly disclosed the bugs and noted that TP-Link has not patched one of the vulnerabilities. READ MORE...