0
Your Cart

Russian Hackers Exploiting Outlook Zero-day to Attack Critical Information Infrastructure

A group linked to Russian military intelligence, known as Fighting Ursa or APT28, has targeted at least 30 companies across 14 countries using a zero-day exploit in Microsoft Outlook (CVE-2023-23397). These organizations include vital infrastructure and sources of strategic intelligence, with a focus on military significance. The group has conducted multiple campaigns exploiting this vulnerability, emphasizing the need for enhanced security measures.

Cybercrime Group Exploiting Windows Driver Vulnerability to Bypass Security Products

Summary:
The cybercrime group Scattered Spider, also known as Roasted 0ktapus and UNC3944, has been targeting telecom and BPO firms by exploiting an old vulnerability in an Intel Ethernet diagnostics driver for Windows. They use phishing, social engineering, and BYOVD techniques to deploy malicious drivers and bypass security protections. Organizations should patch their systems and use endpoint security solutions.