BlackSmith Follows Row Hammer Attack

Researchers have come up with yet another variation of the Rowhammer attack affecting all DRAM chips that bypasses currently deployed mitigations, thereby effectively compromising the security of the devices. dubbed Blacksmith CVE-2021-42114…
Nokia introduced SaaS Dome

Nokia introduced SaaS Dome

Nokia is introducing SaaS services for communication service providers, in an step to giving operators a less expensive, more flexible, more customer centric pathway for operating their network and delivering…
Domain Fronting with CobaltStrike

Domain Fronting with CobaltStrike

A malicious campaign has been found leveraging a technique called domain fronting to hide command-and-control traffic by leveraging a legitimate domain owned by the Myanmar government to route communications to…

Exploit-as-a-service New Model in to Limelight

Cybercriminals are started leasing our rather than just selling zero-day vulnerabilities under a potential ‘exploit-as-a-service’ model for the first time This approach would allow more capable threat actors to ‘rent out’ zero-day…
Ghostwriter 👻  APT

Ghostwriter 👻 APT

Threat Intelligence researchers believe that the Ghostwriter disinformation campaign (aka UNC1151) was linked to the government of Belarus. The campaign tracked as GhostWriter, has been ongoing since at least March…
Prisma Cloud Version 3.0 Loaded

Prisma Cloud Version 3.0 Loaded

Prisma Cloud 3.0 offers cloud infrastructure as a code security, agentless security and next-gen CASB other enhancements to embed security into the entire application lifecycle. With Cloud Code Security, adding…

Intel Bugs Severe BIOS Firmware Issue

Intel disclosed two high-severity vulnerabilities that affect the BIOS firmware in several processor families, both vulnerabilities have received a CVSS v3 score of 8.2. The vulnerabilities, tracked as CVE-2021-0157 and CVE-2021-0158,…

Alibaba Cloud Infrastructure Cryptojacked

Threat actors are compromising Alibaba Cloud infrastructure to deploy cryptocurrency mining malware there comes a warning from Security researchers. The Chinese tech giant is a popular choice for infrastructure-as-a-service (IaaS) in South-East…