Blind Eagle Hacks Colombian Institutions Using NTLM Flaw, RATs and GitHub-Based Attacks – Go Health Pro

Blind Eagle Hacks Colombian Institutions Using NTLM Flaw, RATs and GitHub-Based Attacks – Go Health Pro

The threat actor known as Blind Eagle has been linked to a series of ongoing campaigns targeting Colombian institutions and government entities since November 2024. “The monitored campaigns targeted Colombian judicial institutions and other government or private organizations, with high infection rates,” Check Point said in a new analysis. “More than 1,600 victims were affected … Read more

China-Linked Silk Typhoon Expands Cyber Attacks to IT Supply Chains for Initial Access – Go Health Pro

China-Linked Silk Typhoon Expands Cyber Attacks to IT Supply Chains for Initial Access – Go Health Pro

Mar 05, 2025Ravie LakshmananNetwork Security / Data Breach The China-lined threat actor behind the zero-day exploitation of security flaws in Microsoft Exchange servers in January 2021 has shifted its tactics to target the information technology (IT) supply chain as a means to obtain initial access to corporate networks. That’s according to new findings from the … Read more

Healthcare organizations facing more sophisticated attacks – Go Health Pro

Healthcare organizations facing more sophisticated attacks – Go Health Pro

Attacks on healthcare organizations are becoming more numerous and sophisticated in nature, according to the latest Cybersecurity Buyer Intelligence Report from the Cyber Risk Alliance (CRA).Full disclosure: CRA is the parent company of SC Media.The report, based on intelligence collected from a panel of cybersecurity professionals and managers, found that healthcare organizations are seeing attacks … Read more

Bluetooth Flaws Open Devices To Impersonation Attacks – Go Health Pro

Bluetooth Flaws Open Devices To Impersonation Attacks – Go Health Pro

Updated on May 21, 2021, 1:30pm to include a statement from Cradlepoint Serious security vulnerabilities have been found in  Bluetooth Core and Mesh Profile Specifications, which allow hackers to impersonate legitimate devices and carry on Man-in-the-Middle(MITM) attacks. Researchers from Agence nationale de la sécurité des systèmes d’information (ANSSI) disclosed several vulnerabilities in the two Bluetooth specifications … Read more

New OpenSSH Flaws Enable Man-in-the-Middle and DoS Attacks — Patch Now – Go Health Pro

New OpenSSH Flaws Enable Man-in-the-Middle and DoS Attacks — Patch Now – Go Health Pro

Feb 18, 2025Ravie LakshmananVulnerability / Network Security Two security vulnerabilities have been discovered in the OpenSSH secure networking utility suite that, if successfully exploited, could result in an active machine-in-the-middle (MitM) and a denial-of-service (DoS) attack, respectively, under certain conditions. The vulnerabilities, detailed by the Qualys Threat Research Unit (TRU), are listed below – CVE-2025-26465 … Read more

x