Afternoon Dessert – 2023-01-25

Afternoondessert

Welcome to another Afternoon Dessert breakout:

The Definitive Browser Security Checklist
Security stakeholders have come to realize that the prominent role the browser has in the modern corporate environment requires a re-evaluation of how it is managed and protected. While not long-ago web-borne risks were still addressed by a patchwork of endpoint, network, and cloud solutions, it is now clear that the partial protection these solutions provided is no longer sufficient. Therefore,
Read more….

New stealthy Python RAT malware targets Windows in attacks
A new Python-based malware has been spotted in the wild featuring remote access trojan (RAT) capabilities to give its operators control over the breached systems. […]
Read more….

Lessons Learned from the Windows Remote Desktop Honeypot Report
Over several weeks in October of 2022, Specops collected 4.6 million attempted passwords on their Windows Remote Desktop honeypot system. Here is what they learned. […]
Read more….

Over 4,500 WordPress Sites Hacked to Redirect Visitors to Sketchy Ad Pages
A massive campaign has infected over 4,500 WordPress websites as part of a long-running operation that’s been believed to be active since at least 2017.
According to GoDaddy-owned Sucuri, the infections involve the injection of obfuscated JavaScript hosted on a malicious domain named “track[.]violetlovelines[.]com” that’s designed to redirect visitors to unwanted sites.
The latest operation is
Read more….

Botnets exploited Realtek SDK critical bug in millions of attacks
Hackers have leveraged a critical remote code execution vulnerability in Realtek Jungle SDK 134 million attacks trying to infect smart devices in the second half of 2022. […]
Read more….

Zacks Investment Research data breach affects 820,000 clients
Hackers breached Zacks Investment Research (Zacks) company last year and gained access to personal and sensitive information belonging to 820,000 customers. […]
Read more….

Follow for more…

%d bloggers like this: