Tag: Threat Intelligence

  • Blog
  • Tag: Threat Intelligence
Uncovering a Sophisticated Python Mouse Logger

Uncovering a Sophisticated Python Mouse Logger

Uncovering a Sophisticated Python Malware: Keylogger, Screenshot Grabber, and Mouse Logger In the ever-evolving landscape of cybersecurity threats, keylogging remains a prevalent method for attackers to capture sensitive information such as usernames and passwords. Recently, a new piece of Python malware was uncovered, showcasing not only a keylogger and screenshot grabber but also a unique

Read More
Service Mesh Proxy Models for Cloud-Native Applications

Service Mesh Proxy Models for Cloud-Native Applications

Service Mesh Proxy Models for Cloud-Native Applications The draft of NIST Special Publication (SP) 800-233, titled “Service Mesh Proxy Models for Cloud-Native Applications,” is now available for public comment. This document addresses the rise of service mesh as the main infrastructure for application services in cloud-native environments. Service mesh facilitates essential runtime functions, such as

Read More
Remote Unauthenticated Code Execution Vulnerability In OpenSSH Server

Remote Unauthenticated Code Execution Vulnerability In OpenSSH Server

Remote Unauthenticated Code Execution Vulnerability in OpenSSH Server (RegreSSHion) A critical unauthenticated remote code execution (RCE) vulnerability, identified as CVE-2024-6387, affects OpenSSH servers (sshd) running on glibc-based Linux systems. This vulnerability arises from a race condition in the sshd signal handler. An unauthenticated attacker can trigger this vulnerability by failing to authenticate within the configured

Read More