I. Presentation In this article, we will discover the ADRecon tool for Active Directory Recon which will allow us to collect different information from an Active Directory directory. ADRecon will generate […]
How to Build a Home IT Lab
A home lab is an invaluable resource for cybersecurity professionals to gain practical experience, develop and refine their skills, and stay current in a rapidly changing field.It is a playground […]
Russian Hackers Exploiting Outlook Zero-day to Attack Critical Information Infrastructure
A group linked to Russian military intelligence, known as Fighting Ursa or APT28, has targeted at least 30 companies across 14 countries using a zero-day exploit in Microsoft Outlook (CVE-2023-23397). These organizations include vital infrastructure and sources of strategic intelligence, with a focus on military significance. The group has conducted multiple campaigns exploiting this vulnerability, emphasizing the need for enhanced security measures.
Cybercrime Group Exploiting Windows Driver Vulnerability to Bypass Security Products
Summary:
The cybercrime group Scattered Spider, also known as Roasted 0ktapus and UNC3944, has been targeting telecom and BPO firms by exploiting an old vulnerability in an Intel Ethernet diagnostics driver for Windows. They use phishing, social engineering, and BYOVD techniques to deploy malicious drivers and bypass security protections. Organizations should patch their systems and use endpoint security solutions.
Microsoft Patch Tuesday: 97 Windows Vulns, 1 Exploited Zero-Day
Microsoft’s security patching machine hummed into overdrive Tuesday with the release of fixes for at least 97 documented software vulnerabilities, including a zero-day that’s already been exploited to escape the […]