Chinese Cyberspies Deploy New SSH Backdoor to Hijack Network Devices

Chinese Cyberspies Deploy New SSH Backdoor to Hijack Network Devices

A new SSH backdoor is being actively deployed by the Chinese cyber-espionage group Evasive Panda (aka DaggerFly) to compromise network appliances. Fortinet’s FortiGuard Labs uncovered the attack suite, named ELF/Sshdinjector.A!tr, which has been used in persistent, covert intrusions since mid-November 2024. The malware injects itself into the SSH daemon (SSHD), enabling threat actors to establish […]

PoC Tool Released for Critical Windows LDAP Zero-Click RCE Vulnerability (CVE-2024-49112)

A critical vulnerability in Windows Lightweight Directory Access Protocol (LDAP), tracked as CVE-2024-49112, has been demonstrated with the release of a proof-of-concept (PoC) exploit. This flaw, disclosed by Microsoft during its December 2024 Patch Tuesday update, carries a CVSS score of 9.8, marking it as a severe risk to enterprise networks. Overview of CVE-2024-49112 This […]

Critical D-Link Vulnerability Exposes Routers to Unauthorized Access

A critical security flaw, CVE-2024-13030, has been discovered in the web management interface of the D-Link DIR-823G router (firmware version 1.0.2B05_20181207). This vulnerability enables attackers to bypass access controls, potentially compromising device security and exposing networks to further exploitation. Vulnerability Overview The vulnerability stems from improper access control in the router’s /HNAP1/ endpoint, which governs […]

DoubleClickjacking: A New Threat to Website Security and Account Safety

Cybersecurity researchers have identified a concerning evolution of the traditional clickjacking attack—dubbed DoubleClickjacking. This sophisticated method bypasses existing defenses, leaving even major websites vulnerable to exploitation and exposing users to potential account takeovers. Here’s a deep dive into what DoubleClickjacking is, how it works, and what can be done to mitigate its risks. What Is […]

CVE-2024-11477: Critical 7-Zip Vulnerability

🚨 CVE-2024-11477: Critical 7-Zip Vulnerability 🚨 A newly identified vulnerability in 7-Zip allows Remote Code Execution (RCE), posing a serious threat to users of this popular file archiving tool. Here’s what you need to know: 🔍 What is it? CVE-2024-11477 exploits improper handling of certain file formats, enabling attackers to execute arbitrary code by tricking […]

CVE-2024-43498: A Critical .NET RCE Vulnerability

🚨 CVE-2024-43498: A Critical .NET RCE Vulnerability 🚨 A newly identified high-severity vulnerability in .NET 9.0 (CVE-2024-43498) allows Remote Code Execution (RCE), potentially compromising systems. Here’s what you need to know: 🔍 What is it? Improper handling of crafted requests or files lets attackers execute arbitrary code, threatening applications and servers. 💥 Impact: Unauthorized access […]

Cisco’s DevHub Misconfiguration Exposes Sensitive Data: A Breach in Focus

Cisco, a renowned leader in networking and IT solutions, is facing scrutiny after claims of a significant data breach surfaced. In October, the notorious hacker group IntelBroker alleged that they had gained unauthorized access to Cisco’s systems, exfiltrating sensitive data such as source code, certificates, encryption keys, and confidential documents. While Cisco’s investigation indicates no […]

We specialize in safeguarding businesses from advanced hacker attacks and cyber threats. Our dedicated team of cybersecurity experts employs cutting-edge technology and innovative strategies to protect our clients’ digital assets. We are committed to providing comprehensive security solutions that ensure the safety and integrity of your data, allowing you to operate with confidence in today’s digital landscape. With DefenShield CyberSecurity, your business is in safe hands.

Get in Touch
Open chat
Support
Hello! How can we assist you today? Click "Open chat" to start a conversation with us on WhatsApp.
DefendShield Cybersecurity
Privacy Overview

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.