Decryptedtech Decryptedtech Decryptedtech Decryptedtech
  • Home
  • Articles
    • News
    • Security Talk
    • Game Thoughts
    • Editorials
    • Shows and Events
    • Leaks and Rumors
    • My Ramblings
    • In Other News
    • Bits, Bytes, and Bourbon
  • Consulting
    • Security Consulting
    • Why Us
    • Services
  • Privacy Policy
  • Archived Items
    • Reviews
      • Enthusiast Gear
        • Motherboards
        • CPUs
        • GPUs
        • Audio
        • Storage and Networking
        • Entusiast Peripherals
      • Pro Gear
        • Motherboards
        • Memory
        • Storage and Networking
      • Consumer Gear
        • Motherboards
        • Audio
        • Storage and Networking
        • Consumer Peripherals
      • Home Theater
      • Mobile Computing
      • Tech Unplugged
      • Gadgets
      • Systems
        • Pro Systems
      • Software and Games
        • Consumer Software
        • Games
      • Peripherals
      • Power and Cooling
  • Bits, Bytes, and Bourbon Store

News

News

US Federal Civilian Executive Branch Agency’s Email Compromised by new Chinese APT Group

It seems that an unnamed FCEB agency had their Outlook Web Access (Exchange Online) environment compromised by a new threat group that is current being attributed to China. The attack and the group were disclosed by CISA and the FBI. With the detection of the FCEB email compromise, Microsoft also identified a much larger espionage campaign involving the newly identified group which includes some 20+ organizations. The timing of the attack is concerning due to it coinciding with a recent NATO meeting.

Details
By Sean Kalinich
Sean Kalinich
Jul 13
Hits: 1258
  • Hacking
  • APT
  • Microsoft
  • FBI
  • Cybersecurity
  • CISA
  • ms365
  • storm0558
  • email comrpomise
  • logging

Read more: US Federal Civilian Executive Branch Agency’s...

No comments on “US Federal Civilian Executive Branch Agency’s Email Compromised by new Chinese APT Group”
News

Security Researchers are Still on Attacker Radar as new “POC” is Found to have Malware Inside

If I have said it once, I have said it a thousand times; attackers are cunning. The adage that attackers are lazy has nothing to do with strategic, tactical, or technical knowledge. They understand the landscape and, in many cases, better than the organizations they are attacking do. Because of this deep understanding of their target environment, they also know to be on the lookout for special purpose entities. In this case we are talking about Security Researchers. Security researchers are a special target for attackers and when they can leverage an existing opportunity to target and potentially compromise them, they are going to take it.

Details
By Sean Kalinich
Sean Kalinich
Jul 13
Hits: 1352
  • Hacking
  • Malware
  • Cybersecurity
  • Linux
  • threat actors
  • github
  • poc
  • security researchers
  • kworker
  • uptycs
  • proof of concept

Read more: Security Researchers are Still on Attacker Radar...

No comments on “Security Researchers are Still on Attacker Radar as new “POC” is Found to have Malware Inside”
News

Policy Loopholes in Microsoft Windows used to Allow Forged Kernel-Mode Driver Signatures

Diver Signing requirements in Windows is a feature that is intended to help prevent the Windows Operating system from being compromised through malicious software posing as legitimate drivers. The policy was implemented way back in early versions of the 64-bit flavor of Windows XP and became a defacto security policy very quickly after that. Since its implementation and enforcement threat groups have found multiple ways around this policy including the use of compromised certificate issuing groups, purchasing actually legitimate certificates, and certificate theft.

Details
By Sean Kalinich
Sean Kalinich
Jul 11
Hits: 1501
  • Windows
  • Hacking
  • Security
  • Malware
  • Cybersecurity
  • windows security
  • kernelmode driver signing

Read more: Policy Loopholes in Microsoft Windows used to...

No comments on “Policy Loopholes in Microsoft Windows used to Allow Forged Kernel-Mode Driver Signatures”
News

Vishing Efforts in South Korea get a Boost from new “Letscall” Malware

Social engineering efforts via voice calls (Vishing) is nothing new. The use of phone calls for malicious activity is pretty old and include such popular scams as extended car warranties, IRS collection attempts, and the ever popular “there is a complaint against you”. These are just a few of the consumer scams that have been in play and are still in play. On the corporate side there are even more which target general employees and support personnel to either gain entry or enable some form of financial fraud. Sadly, this pivot is also seriously under managed by most organizations, with few providing any preventative training and most not testing this attack vector to determine exposure.

Details
By Sean Kalinich
Sean Kalinich
Jul 10
Hits: 1213
  • Hacking
  • Malware
  • Cybersecurity
  • Social Engineering
  • vishing
  • voice phishing
  • lastcall

Read more: Vishing Efforts in South Korea get a Boost from...

No comments on “Vishing Efforts in South Korea get a Boost from new “Letscall” Malware”
News

Progress Software’s MOVEit has yet another Unauthenticated SQL Injection Flaw

Last week Progress Software, the company behind MOVEit file transfer software, announced another SQL injection flaw had been identified and patched. This flaw is just the latest in a series of vulnerabilities that have been identified in the application after the Cl0p ransomware group was found to have exploited a different SQL injection flaw to steal data from multiple MOVEit users. The attacks started in late 2022, but the Cl0p group might have been testing different entry points as far back as June 2022.

Details
By Sean Kalinich
Sean Kalinich
Jul 10
Hits: 949
  • Hacking
  • Malware
  • Exploits
  • Cybersecurity
  • Flaw
  • Vulnerabilities
  • cl0p ransomware
  • moveit
  • progress software

Read more: Progress Software’s MOVEit has yet another...

No comments on “Progress Software’s MOVEit has yet another Unauthenticated SQL Injection Flaw”

More Articles …

  1. Let’s Talk a Minute About Meta’s Threads and the Data it Wants
  2. NPM is back in the news as Node.js is found to be open to a Manifest Confusion Attack
  3. Microsoft Teams Flaw Leveraged by New Red Team Tool to Push Malware
  4. New Process Injection Method Found that can Potentially Avoid EDR Detection
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10

Page 2 of 570

Follow Us

Follow DecryptedTech on Social Media

facebook twitter linkedin
Decryptedtech