Top
item
Advertisement

Tag: Featured


Privacy protection, Security

10 tips to keep IP safe

April 16, 2024

Via: CSO Online

Your company’s intellectual property—whether that’s patents, trade secrets or just employee know-how—may be more valuable than your physical assets. Here’s to establish basic policies and procedures for IP protection. Intellectual property (IP) is the lifeblood of every organization. It didn’t […]


Cyber-crime, Identity theft

Ransomware group Dark Angels claims the theft of 1TB of data from chipmaker Nexperia 

April 16, 2024

Via: Security Affairs

The Dark Angels (Dunghill) ransomware group claims responsibility for hacking chipmaker Nexperia and stealing 1 TB of the company’s data. Nexperia is a semiconductor manufacturer headquartered in Nijmegen, the Netherlands. It is a subsidiary of the partially state-owned Chinese company […]


Hacker, Threats & Malware

U.S. and Australian police arrested Firebird RAT author and operator

April 15, 2024

Via: Security Affairs

A joint law enforcement operation conducted by the Australian Federal Police (AFP) and the FBI resulted in the arrest and charging of two individuals suspected of creating and selling the Firebird RAT, which was later renamed as Hive. Australian Federal […]


Mobile, Mobile security, Threats & Malware, Virus & Malware

Chinese-Linked LightSpy iOS Spyware Targets South Asian iPhone Users

April 15, 2024

Via: The Hacker News

Cybersecurity researchers have discovered a “renewed” cyber espionage campaign targeting users in South Asia with the aim of delivering an Apple iOS spyware implant called LightSpy. “The latest iteration of LightSpy, dubbed ‘F_Warehouse,’ boasts a modular framework with extensive spying […]


Cyber warfare, Cyber-crime

Ukrainian Blackjack group used ICS malware Fuxnet against Russian targets

April 15, 2024

Via: Security Affairs

Industrial and enterprise IoT cybersecurity firm Claroty reported that the Ukrainian Blackjack hacking group claims to have damaged emergency detection and response capabilities in Moscow and beyond the Russian capital using a destructive ICS malware dubbed Fuxnet. The Blackjack group […]


Hacker, Threats & Malware

Rewards For Justice offers up to $10 million reward for info on ALPHV BlackCat hacker group leaders

April 10, 2024

Via: Panda Security

Rewards For Justice (RFJ), a U.S. government interagency rewards program. Offers up to $10 million reward for any information that could lead to the identification or location of any person from the ALPHV cyber gang, also known as BlackCat, who […]


Threats & Malware, Vulnerabilities

Windows 10 latest update is broken and riddled with bugs – with no fix in sight

April 9, 2024

Via: TechRadar

Back in January, we reported on a small security update patch for Windows 10 that brought on a lot of headaches for IT admins and brought on a veritable cavalcade of error codes. Microsoft promised a fix was in the […]


Data loss, Threats & Malware

Home Depot confirms worker data leak after miscreant dumps info online

April 8, 2024

Via: The Register

Home Depot has confirmed that a third-party company accidentally exposed some of its employees’ personal details after a criminal copy-pasted the data online. In a statement to The Register, Home Depot spokesperson Beth Marlowe said: “A third-party SaaS vendor inadvertently […]


Threats & Malware, Vulnerabilities

Hugging Face says it fixed some worrying security issues, moves to boost online protection

April 8, 2024

Via: TechRadar

Multiple generative AI models uploaded to Hugging Face were found to be vulnerable in a way that allowed threat actors to run malicious code and extract sensitive user information. This is according to a new report from the cloud security […]


Cyber-crime, Malware

Solar Spider Spins Up New Malware to Entrap Saudi Arabian Financial Firms

April 8, 2024

Via: Dark Reading

The sophisticated threat group behind a complex JavaScript remote access Trojan (RAT) known as JSOutProx has released a new version of the malware to target organizations in the Middle East. Cybersecurity services firm Resecurity analyzed technical details of multiple incidents […]


Cyber-crime, Phishing

Massive Phishing Campaign Strikes Latin America: Venom RAT Targeting Multiple Sectors

April 2, 2024

Via: The Hacker News

The threat actor known as TA558 has been attributed to a new massive phishing campaign that targets a wide range of sectors in Latin America with the goal of deploying Venom RAT. The attacks primarily singled out hotel, travel, trading, […]


Mobile, Mobile security

Feds finally decide to do something about years-old SS7 spy holes in phone networks

April 2, 2024

Via: The Register

The FCC appears to finally be stepping up efforts to secure decades-old flaws in American telephone networks that are allegedly being used by foreign governments and surveillance outfits to remotely spy on and monitor wireless devices. At issue are the […]


Threats & Malware, Virus & Malware

Detecting Windows-based Malware Through Better Visibility

April 1, 2024

Via: The Hacker News

Despite a plethora of available security solutions, more and more organizations fall victim to Ransomware and other threats. These continued threats aren’t just an inconvenience that hurt businesses and end users – they damage the economy, endanger lives, destroy businesses […]


Threats & Malware, Virus & Malware

Info stealer attacks target macOS users

April 1, 2024

Via: Security Affairs

Jamf Threat Labs researchers analyzed info stealer malware attacks targeting macOS users via malicious ads and rogue websites. One of the attacks spotted by the researchers relied on sponsored ads proposed to the users while searching for “Arc Browser” on […]


Mobile, Mobile security, Threats & Malware, Virus & Malware

Vultur Android Banking Trojan Returns with Upgraded Remote Control Capabilities

April 1, 2024

Via: The Hacker News

The Android banking trojan known as Vultur has resurfaced with a suite of new features and improved anti-analysis and detection evasion techniques, enabling its operators to remotely interact with a mobile device and harvest sensitive data. “Vultur has also started […]


Email security, Security

5 ways to improve email security

March 27, 2024

Via: TechRadar

With email being the biggest business productivity tool out there, it’s no surprise that it’s also the main vehicle for cybercrime. Email phishing is the most common type of online exploitation, which grew by 173% in Q3 of 2023 compared […]


Threats & Malware, Virus & Malware

The impact of compromised backups on ransomware outcomes

March 26, 2024

Via: Naked Security

There are two main ways to recover encrypted data in a ransomware attack: restoring from backups and paying the ransom. Compromising an organization’s backups enables adversaries to restrict their victim’s ability to recover encrypted data and dial-up the pressure to […]


Data loss, Threats & Malware

Microsoft confirms memory leak in March Windows Server security update

March 25, 2024

Via: The Register

If your Windows domain controllers have been crashing since a security update was installed earlier this month, there’s no longer any need to speculate why: Microsoft has admitted it introduced a memory leak in its March patches and fixed the […]


Hacker, Threats & Malware, Virus & Malware

Iran-Linked APT TA450 embeds malicious links in PDF attachments

March 25, 2024

Via: Security Affairs

Proofpoint researchers observed the Iran-linked APT group MuddyWater (aka SeedWorm, TEMP.Zagros, TA450, and Static Kitten) was behind a new phishing campaign in March 2024 that attempted to drop a legitimate Remote Monitoring and Management (RMM) solution called Atera on the […]


Cyber warfare, Cyber-crime

US charges Chinese nationals with cyber-spying on pretty much everyone for Beijing

March 25, 2024

Via: The Register

The United States on Monday accused seven Chinese men of breaking into computer networks, email accounts, and cloud storage belonging to numerous critical infrastructure organizations, companies, and individuals, including US businesses, politicians, and their political parties. According to American prosecutors, […]