North Korean Hackers Targeting Developers with Malicious npm Packages

February 26, 2024 at 07:39AM Fake npm packages linked to North Korean state-sponsored actors were discovered on the Node.js repository, posing a software supply chain attack. The malicious packages, posing as legitimate ones, installed cryptocurrency and credential stealers. The attackers made efforts to conceal the code and made connections to North Korean threat actors. Vigilance … Read more

New Malicious PyPI Packages Caught Using Covert Side-Loading Tactics

February 21, 2024 at 04:27AM Cybersecurity researchers discovered two malicious Python packages on PyPI repository, NP6HelperHttptest and NP6HelperHttper, using DLL side-loading to evade detection by security software. These fake packages aimed to deceive developers into downloading rogue counterparts of legitimate ones. The malicious code included a remote access trojan and was part of a wider … Read more

Role of Wazuh in building a robust cybersecurity architecture

January 26, 2024 at 10:28AM Cybersecurity architecture is crucial for organizations to secure their information systems against cyber threats. Leveraging open source solutions and tools can offer cost-effective, flexible, and transparent benefits. Wazuh, a free and open source security solution, plays a significant role in implementing cybersecurity architecture by offering unified XDR and SIEM protection, … Read more

Critical Jenkins Vulnerability Exposes Servers to RCE Attacks – Patch ASAP!

January 25, 2024 at 11:38AM Jenkins recently resolved nine security flaws, including a critical bug (CVE-2024-23897) enabling remote code execution. An arbitrary file read vulnerability through the command line interface was identified. Attackers could exploit this to read arbitrary files on the Jenkins controller file system. The flaw was discovered by Yaniv Nizry and fixed … Read more

The Unknown Risks of The Software Supply Chain: A Deep-Dive

January 24, 2024 at 04:24AM Open-source components are increasingly used in applications, challenging traditional Software Composition Analysis (SCA) tools’ ability to combat open-source threats. As businesses capitalize on open-source libraries to expedite application development, the reliance on interconnected dependencies introduces vulnerabilities in the supply chain. Gartner predicts a surge in supply chain attacks, advocating heightened … Read more

Malicious NPM Packages Exfiltrate Hundreds of Developer SSH Keys via GitHub

January 23, 2024 at 01:05PM Two malicious npm packages, warbeast2000 and kodiak2k, leveraged GitHub to store stolen Base64-encrypted SSH keys. They were discovered and taken down after attracting 412 and 1,281 downloads. The modules run a postinstall script to execute JavaScript files, potentially compromising security. The incident highlights ongoing supply chain security threats. Some key … Read more

MavenGate Attack Could Let Hackers Hijack Java and Android via Abandoned Libraries

January 22, 2024 at 12:06PM New software supply chain attack method MavenGate targets public and popular libraries used in Java and Android apps. Vulnerabilities allow hijacking of artifacts and injecting malicious code. Oversecured sent reports to tech companies. Attack involves domain name purchases and exploiting abandoned libraries. Sonatype claims automation prevents attacks, but recommends end … Read more

Wazuh: Building robust cybersecurity architecture with open source tools

January 17, 2024 at 10:14AM Cybersecurity architecture involves designing an organization’s security approach to protect digital assets from a wide range of cyber threats. While implementing security solutions can be costly, leveraging open source tools offers advantages such as cost-effectiveness, flexibility, and community support. Various open source security tools, including Wazuh, ClamAV, Suricata, pfSense, ModSecurity, … Read more

Using Wazuh to build a cybersecurity architecture with open source tools

January 17, 2024 at 10:07AM Cybersecurity architecture involves designing an organization’s approach to securing its information systems. It aims to establish a resilient defense against cyber threats. Leveraging open source tools offers cost-effectiveness and flexibility. Selecting tools like Wazuh, ClamAV, Suricata, pfSense, ModSecurity, VeraCrypt, OpenDLP, and OpenVAS helps build a robust cybersecurity architecture. Wazuh, in … Read more

Four in five Apache Struts 2 downloads are for versions featuring critical flaw

December 21, 2023 at 09:20AM Sonatype reports low adoption of fixed versions of Struts 2 despite a critical RCE vulnerability (CVE-2023-50164) in the framework’s file upload feature. The fix is simple: use updated Struts versions. With active exploitation and ease of automatable attacks, Sonatype urges immediate upgrades to mitigate potential risks and emphasizes vigilant maintenance … Read more