+44 (0)203 88 020 88

Menu

Search

Author name: Ian Reynolds

Business Email Compromise

Avoiding Business Email Compromise (BEC) Attacks in Microsoft 365

Business Email Compromise (BEC) is a sophisticated form of cybercrime where attackers impersonate trusted individuals or organisations to manipulate victims into transferring money, sharing sensitive information, or taking other actions that benefit the attacker. BEC attacks often involve social engineering techniques, such as email spoofing, spear phishing, or even infiltrating legitimate email accounts. Unlike traditional […]

Avoiding Business Email Compromise (BEC) Attacks in Microsoft 365 Read More »

How EagerBee is Redefining Cyber Espionage in the Middle East

In early January 2025, cybersecurity researchers uncovered a sophisticated cyber espionage campaign targeting Internet Service Providers (ISPs) and government entities in the Middle East. At the centre of this campaign lies an advanced malware framework known as EagerBee, which has been significantly upgraded with new capabilities to facilitate stealthy and persistent access to compromised systems.

How EagerBee is Redefining Cyber Espionage in the Middle East Read More »

FunkSec: The Emergence of AI-Driven Ransomware Threats

In late 2024, a new ransomware group known as FunkSec emerged, leveraging artificial intelligence (AI) to enhance their cybercriminal activities. By January 2025, they had targeted over 85 organisations worldwide, employing sophisticated tactics that blend AI capabilities with traditional ransomware methods. Understanding FunkSec’s Modus Operandi FunkSec employs a double extortion strategy, which involves both encrypting

FunkSec: The Emergence of AI-Driven Ransomware Threats Read More »

Strela Stealer Malware – From Invoice Phishing to Thread Hijacking

In recent months, a notable wave of cyber-attacks has swept across Europe, orchestrated by the cybercriminal group known as Hive0145. This group, also referred to by various threat intelligence entities as a highly organised Advanced Persistent Threat (APT), has been delivering a specific strain of malware—Strela Stealer—to infiltrate and compromise systems. Targeting countries primarily including

Strela Stealer Malware – From Invoice Phishing to Thread Hijacking Read More »

Palo Alto Networks PAN-OS RCE Vulnerability (CVE-2024-5910)

Palo Alto Networks has issued an urgent advisory to its customers, highlighting a potential remote code execution (RCE) vulnerability within the PAN-OS management interface. The cybersecurity firm advises organisations to secure access to this interface to mitigate potential risks. The advisory follows claims of a new RCE vulnerability targeting the PAN-OS management interface. While the

Palo Alto Networks PAN-OS RCE Vulnerability (CVE-2024-5910) Read More »

Critical VMware vCenter Server Vulnerability (CVE-2024-38812) Poses Serious Risk

The CVE-2024-38812 vulnerability is a critical flaw that exposes VMware vCenter Servers to serious security risks, including remote code execution and full system compromise. Organisations using VMware’s virtualisation tools must prioritise the patching of this vulnerability and implement strict security measures to prevent exploitation. Swift action is required to protect virtual infrastructure and mitigate the

Critical VMware vCenter Server Vulnerability (CVE-2024-38812) Poses Serious Risk Read More »

Critical Microsoft SharePoint Vulnerability (CVE-2024-38094) Creates Remote Code Execution Threat

The recently disclosed vulnerability, CVE-2024-38094, in Microsoft SharePoint presents a significant threat to organisations by allowing attackers to execute remote code on compromised servers. This flaw stems from improper input validation when processing ASPX files in SharePoint, and it requires minimal user interaction to exploit. Once exploited, the consequences can be severe, particularly for organisations

Critical Microsoft SharePoint Vulnerability (CVE-2024-38094) Creates Remote Code Execution Threat Read More »

Nation-State Attackers Exploiting Critical Infrastructure: A Growing Threat

Nation-state cyberattacks on critical infrastructure are becoming increasingly sophisticated and destructive, as highlighted by recent reports. In October 2024, attackers began exploiting vulnerabilities in Ivanti software used by critical sectors, including energy and transportation. These vulnerabilities allowed cyber actors to gain unauthorised access, move laterally within networks, and execute persistent attacks, sometimes even “patching” exploited

Nation-State Attackers Exploiting Critical Infrastructure: A Growing Threat Read More »

Apple Patches VoiceOver Bug That Could Read Passwords Aloud

Apple has recently addressed a significant vulnerability in its VoiceOver feature that raised privacy concerns for iPhone and iPad users. The flaw, identified as CVE-2024-44204, allowed the VoiceOver accessibility tool to read saved passwords out loud, a critical issue for users relying on this feature to navigate their devices without visual input. The bug was

Apple Patches VoiceOver Bug That Could Read Passwords Aloud Read More »

Latest Snapekit Rootkit Poses Threat to Arch Linux Users

A newly discovered rootkit known as “Snapekit” has emerged, posing a significant risk to users of Arch Linux systems, particularly those running the 6.10.2-arch1-1 kernel. According to reports from multiple cybersecurity researchers, Snapekit is a highly sophisticated rootkit that exploits 21 system calls, enabling it to operate stealthily while avoiding detection. Its ability to remain

Latest Snapekit Rootkit Poses Threat to Arch Linux Users Read More »

0

No products in the basket.

No products in the basket.