Advertisement
Top

LATEST PUBLICATIONS



Hackers Exploit OpenMetadata Flaws to Mine Crypto on Kubernetes

April 18, 2024

Threat actors are actively exploiting critical vulnerabilities in OpenMetadata to gain unauthorized access to Kubernetes workloads and leverage them for cryptocurrency mining activity. That’s according to the Microsoft Threat Intelligence team, which said the flaws have been weaponized since the […]


Windows 10 latest update is broken and riddled with bugs – with no fix in sight

April 9, 2024

Back in January, we reported on a small security update patch for Windows 10 that brought on a lot of headaches for IT admins and brought on a veritable cavalcade of error codes. Microsoft promised a fix was in the […]


Massive Phishing Campaign Strikes Latin America: Venom RAT Targeting Multiple Sectors

April 2, 2024

The threat actor known as TA558 has been attributed to a new massive phishing campaign that targets a wide range of sectors in Latin America with the goal of deploying Venom RAT. The attacks primarily singled out hotel, travel, trading, […]


Cyber-crime, Phishing

FIN7 targeted a large U.S. carmaker with phishing attacks

April 18, 2024

Via: Security Affairs

In late 2023, BlackBerry researchers spotted the threat actor FIN7 targeting a large US automotive manufacturer with a spear-phishing campaign. FIN7 targeted employees who worked in the company’s IT department and had higher levels of administrative rights. The attackers employed […]


Cyber warfare, Cyber-crime

Dangerous ICS Malware Targets Orgs in Russia and Ukraine

April 17, 2024

Via: Dark Reading

Two dangerous malware tools targeted at industrial control systems (ICS) and operating technology (OT) environments in Europe are the latest manifestations of the cyber fallout from the war in Ukraine. One of the tools, dubbed “Kapeka,” appears linked to Sandworm, […]


Privacy protection, Security

10 tips to keep IP safe

April 16, 2024

Via: CSO Online

Your company’s intellectual property—whether that’s patents, trade secrets or just employee know-how—may be more valuable than your physical assets. Here’s to establish basic policies and procedures for IP protection. Intellectual property (IP) is the lifeblood of every organization. It didn’t […]


Mobile, Mobile security, Threats & Malware, Virus & Malware

Chinese-Linked LightSpy iOS Spyware Targets South Asian iPhone Users

April 15, 2024

Via: The Hacker News

Cybersecurity researchers have discovered a “renewed” cyber espionage campaign targeting users in South Asia with the aim of delivering an Apple iOS spyware implant called LightSpy. “The latest iteration of LightSpy, dubbed ‘F_Warehouse,’ boasts a modular framework with extensive spying […]


Cyber warfare, Cyber-crime

Ukrainian Blackjack group used ICS malware Fuxnet against Russian targets

April 15, 2024

Via: Security Affairs

Industrial and enterprise IoT cybersecurity firm Claroty reported that the Ukrainian Blackjack hacking group claims to have damaged emergency detection and response capabilities in Moscow and beyond the Russian capital using a destructive ICS malware dubbed Fuxnet. The Blackjack group […]


Threats & Malware, Vulnerabilities

Palo Alto Networks Warns of Exploited Firewall Vulnerability

April 12, 2024

Via: Security Week

Tracked as CVE-2024-3400 and assigned a severity score of 10 out of 10, the security defect was identified in the GlobalProtect feature of PAN-OS, the operating system running on Palo Alto Networks appliances. “A command injection vulnerability in the GlobalProtect […]