Cybersecurity

How Each Pillar of the 1st Amendment is Under Attack 

How Each Pillar of the 1st Amendment is Under Attack 

In an address to Congress this month, President Trump claimed he had “brought free speech back to America.” But barely two months into his second term, the president has waged an unprecedented attack on the First Amendment rights of journalists, students, universities, government workers, lawyers and judges.

This story explores a slew of recent actions by the Trump administration that threaten to undermine all five pillars of the First Amendment to the U.S. Constitution, which guarantees freedoms concerning speech, religion, the media, the right to assembly, and the right to petition the government and seek redress for wrongs.

RESURGE Malware Exploits Ivanti Flaw with Rootkit and Web Shell Features 

RESURGE Malware Exploits Ivanti Flaw with Rootkit and Web Shell Features 

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has shed light on a new malware called RESURGE that has been deployed as part of exploitation activity targeting a now-patched security flaw in Ivanti Connect Secure (ICS) appliances.
“RESURGE contains capabilities of the SPAWNCHIMERA malware variant, including surviving reboots; however, RESURGE contains distinctive commands that

New Android Trojan Crocodilus Abuses Accessibility to Steal Banking and Crypto Credentials 

New Android Trojan Crocodilus Abuses Accessibility to Steal Banking and Crypto Credentials 

Cybersecurity researchers have discovered a new Android banking malware called Crocodilus that’s primarily designed to target users in Spain and Turkey.
“Crocodilus enters the scene not as a simple clone, but as a fully-fledged threat from the outset, equipped with modern techniques such as remote control, black screen overlays, and advanced data harvesting via accessibility logging,”

BlackLock Ransomware Exposed After Researchers Exploit Leak Site Vulnerability 

BlackLock Ransomware Exposed After Researchers Exploit Leak Site Vulnerability 

In what’s an instance of hacking the hackers, threat hunters have managed to infiltrate the online infrastructure associated with a ransomware group called BlackLock, uncovering crucial information about their modus operandi in the process.
Resecurity said it identified a security vulnerability in the data leak site (DLS) operated by the e-crime group that made it possible to extract

Researchers Uncover 46 Critical Flaws in Solar Inverters From Sungrow, Growatt, and SMA 

Researchers Uncover 46 Critical Flaws in Solar Inverters From Sungrow, Growatt, and SMA 

Cybersecurity researchers have disclosed 46 new security flaws in products from three solar inverter vendors, Sungrow, Growatt, and SMA, that could be exploited by a bad actor to seize control of devices or execute code remotely, posing severe risks to electrical grids. 
The vulnerabilities have been collectively codenamed SUN:DOWN by Forescout Vedere Labs.
“The new vulnerabilities can be

CoffeeLoader Uses GPU-Based Armoury Packer to Evade EDR and Antivirus Detection 

CoffeeLoader Uses GPU-Based Armoury Packer to Evade EDR and Antivirus Detection 

Cybersecurity researchers are calling attention to a new sophisticated malware called CoffeeLoader that’s designed to download and execute secondary payloads.
The malware, according to Zscaler ThreatLabz, shares behavioral similarities with another known malware loader known as SmokeLoader. 
“The purpose of the malware is to download and execute second-stage payloads while evading

Product Walkthrough: How Datto BCDR Delivers Unstoppable Business Continuity 

Product Walkthrough: How Datto BCDR Delivers Unstoppable Business Continuity 

Long gone are the days when a simple backup in a data center was enough to keep a business secure. While backups store information, they do not guarantee business continuity during a crisis. With IT disasters far too common and downtime burning through budgets, modern IT environments require solutions that go beyond storage and enable instant recovery to minimize downtime and data loss. This is

PJobRAT Malware Campaign Targeted Taiwanese Users via Fake Chat Apps 

PJobRAT Malware Campaign Targeted Taiwanese Users via Fake Chat Apps 

An Android malware family previously observed targeting Indian military personnel has been linked to a new campaign likely aimed at users in Taiwan under the guise of chat apps.
“PJobRAT can steal SMS messages, phone contacts, device and app information, documents, and media files from infected Android devices,” Sophos security researcher Pankaj Kohli said in a Thursday analysis.
PJobRAT, first

Nine-Year-Old npm Packages Hijacked to Exfiltrate API Keys via Obfuscated Scripts 

Nine-Year-Old npm Packages Hijacked to Exfiltrate API Keys via Obfuscated Scripts 

Cybersecurity researchers have discovered several cryptocurrency packages on the npm registry that have been hijacked to siphon sensitive information such as environment variables from compromised systems.
“Some of these packages have lived on npmjs.com for over 9 years, and provide legitimate functionality to blockchain developers,” Sonatype researcher Ax Sharma said. “However, […] the latest

NEW CUSTOMERS CALL TODAY: 720.221.6804  |  EXISTING CUSTOMERS REQUIRING SUPPORT: 303.617.6442

X