Cisco Report Cyber Attacks

Dark Market Shop Sells RDP Access to Airport System for $10

Stolen or brute-forced remote desktop protocol (RDP) credentials have played a central role in many data breaches over the years and cybercriminals have made a business out of selling them on the ...
Security Boulevard
Spy Group Targeted Air-Gapped Systems via Compromised Secure USB Drives

Spy Group Targeted Air-Gapped Systems via Compromised Secure USB Drives

Security researchers have found evidence that a cyberespionage group has somehow compromised secure USB drives used by government agencies in South Korea, which might have allowed them to target air-gapped systems. “Weaponizing ...
Security Boulevard
Free HTTPS Wildcard Certificates Are Now Available

Free HTTPS Wildcard Certificates Are Now Available

Not-for-profit certificate authority Let’s Encrypt has started issuing wildcard HTTPS certificates for free, allowing organizations with a large number of web assets to significantly simplify their certificate management. Let’s Encrypt has been ...
Security Boulevard
Flaws in Development Tools Expose Android App Makers to Attacks

Flaws in Development Tools Expose Android App Makers to Attacks

Millions of computers and servers that are used to develop, test and analyze Android applications were put at risk by vulnerabilities in widely used development tools. The flaws were discovered by researchers ...
Security Boulevard
Supply Chain Attack Hits Maker of Popular MacOS Apps

Supply Chain Attack Hits Maker of Popular MacOS Apps

Eltima Software, a maker of popular applications for macOS, had its website compromised by hackers who replaced the installers for two of its applications with trojanized versions. This is the latest in ...
40 Enterprise Computers Infected with Second-Stage CCleaner Malware

40 Enterprise Computers Infected with Second-Stage CCleaner Malware

The cyberespionage group that managed to inject malware into CCleaner installers used them to deploy specialized malware to 40 computers from 12 technology and telecommunications companies. The new information comes from researchers ...
CCleaner Supply Chain Attack Targeted Technology Companies

CCleaner Supply Chain Attack Targeted Technology Companies

New evidence shows the hackers who infected the installers for the popular CCleaner system optimization tool were primarily targeting the program’s business users. There are also links between the malware code and ...
Attackers Use Undocumented Word Feature to Fingerprint Victims' Software

Attackers Use Undocumented Word Feature to Fingerprint Victims’ Software

Attackers are taking advantage of an undocumented feature in Microsoft Word to gather information about potential victims by using seemingly harmless documents that have no active code embedded in them. The technique ...