24 November 2023

  • Researchers identify a Rust-powered variant of SysJoker used by a Hamas-linked threat actor against Israel.
  • Malware was rewritten in Rust, signifying significant code changes.


  • Publicly exposed Kubernetes configuration secrets raise concerns for Fortune 500 companies.
  • Encoded secrets discovered in public repositories heighten the risk of supply chain attacks.


  • Konni threat group utilizes Russian-language Microsoft Word documents to distribute malware for data harvesting.
  • Activity attributed to Konni shares similarities with North Korean APT43 (Kimsuky) cluster.


  • Malicious emails themed around shipping distribute WailingCrab malware composed of loader, injector, downloader, and backdoor components.
  • IBM X-Force researchers detail the sophisticated structure of the malware.


  • Active malware campaign exploits zero-day vulnerabilities in routers and video recorders, forming a Mirai-based DDoS botnet.
  • Malicious payload targets devices with default admin credentials, installing Mirai variants upon successful compromise.


miraibotnetzero-daywailingcrabkonnikubernetessysjoker

Newsletter

Subscribe to our newsletter to stay informed about CyberSecurity news. You can unsubscribe at any time.

More than Cyber Security

We offer a variety of services to help companies be prepared for real cyber-attacks.

Contact Us