March 20, 2023
Via: Security WeekIn a press release published on Friday, Hitachi Energy said the Cl0p ransomware gang targeted the GoAnywhere product and may have gained unauthorized access to employee data in some countries. “Upon learning of this event, we took immediate action and […]
March 20, 2023
Via: Security WeekAcrobat Sign is a cloud service that allows registered users to sign, send, and track documents in real-time, as well as to send signature requests to anyone. When a signature request is sent, Acrobat Sign automatically generates and sends an […]
March 20, 2023
Via: CSO OnlineThe emergence of effective natural language processing tools such as ChatGPT means it’s time to begin understanding how to harden against AI-enabled cyberattacks. The natural language generation capabilities of large language models (LLMs) are a natural fit for one of […]
March 15, 2023
Via: Help Net SecurityESET researchers have uncovered a compromise of an East Asian data loss prevention (DLP) company. The attackers utilized at least three malware families during the intrusion, compromising both the internal update servers and third-party tools utilized by the company. This […]
March 9, 2023
Via: The Hacker NewsIranian state-sponsored actors are continuing to engage in social engineering campaigns targeting researchers by impersonating a U.S. think tank. “Notably the targets in this instance were all women who are actively involved in political affairs and human rights in the […]
March 9, 2023
Via: The RegisterSuspected Chinese cyber criminals have zeroed in on unpatched SonicWall gateways and are infecting the devices with credential-stealing malware that persists through firmware upgrades, according to Mandiant. The spyware targets the SonicWall Secure Mobile Access (SMA) 100 Series – a […]
March 8, 2023
Via: Help Net Security92% of organizations have fallen victim to successful phishing attacks in the last 12 months, while 91% of organizations have admitted to experiencing email data loss, according to Egress. Not surprisingly, 99% of cybersecurity leaders confess to being stressed about […]
March 8, 2023
Via: The Hacker NewsHigh-profile government entities in Southeast Asia are the target of a cyber espionage campaign undertaken by a Chinese threat actor known as Sharp Panda since late last year. The intrusions are characterized by the use of a new version of […]
March 6, 2023
Via: Security WeekThe cyberattack started on February 8 and was disclosed on February 10, when Oakland announced that it had taken systems offline to contain the incident, but that emergency services were not impacted. One week later, while continuing restoration efforts, the […]
March 3, 2023
Via: The Hacker NewsThe China-aligned Mustang Panda actor has been observed using a hitherto unseen custom backdoor called MQsTTang as part of an ongoing social engineering campaign that commenced in January 2023. “Unlike most of the group’s malware, MQsTTang doesn’t seem to be […]
March 2, 2023
Via: Tech RadarBot malware, where incidents automated malicious code capable of exfiltrating entire user profiles from target endpoints, are on the rise, a new report from NordVPN has warned. The company’s research claims that the data of five million people has been […]
March 2, 2023
Via: Tech RadarA new phishing campaign hs been discovered targeting cryptocurrency hardware wallet firm Trezor. These wallets allow crypto users to store their funds offline, rather than in a “hot wallet” (a mobile or desktop app), or with a third party (an […]
March 2, 2023
Via: SecureWorldCybersecurity is one of the most pressing challenges in the 21st century. As cyber threats grow more sophisticated and diverse, countries need a robust and coordinated strategy to defend their interests and values in cyberspace. Which is why the Biden […]
March 1, 2023
Via: SecureWorldWhen it comes to cybersecurity, the use of automatic protection tools is half the battle. The human element plays an increasingly important role, as well, and for good reason. Scammers like to take shortcuts and know that it’s easier to […]
February 27, 2023
Via: Help Net SecurityIn today’s data-driven world, the expectations and demands faced by many organizations worldwide are reaching unseen levels. To meet the challenge, a data-driven approach is necessary, with effective digital transformation needed to improve operational efficiency, streamline processes, and get more […]
February 24, 2023
Via: Dark ReadingWhen Russia invaded Ukraine on Feb. 24, 2022, much discussion ensued about how the war would be both cyber and kinetic. A year later, the consensus seems to be that while there was a lot of cyberattack activity, it wasn’t […]
February 23, 2023
Via: Security AffairsAccording to a joint report published by the Dutch General Intelligence and Security Service (AIVD), and the Military Intelligence and Security Service (MIVD), many cyber operations conducted by Russia-linked hackers against Ukraine and NATO members during the past year have […]
February 23, 2023
Via: The Hacker NewsTrojanized versions of legitimate applications are being used to deploy evasive cryptocurrency mining malware on macOS systems. Jamf Threat Labs, which made the discovery, said the XMRig coin miner was executed by means of an unauthorized modification in Final Cut […]
Cyber-crime, Malware, Threats & Malware, Vulnerabilities
February 22, 2023
Via: Help Net SecurityResearchers identified 56 new vulnerabilities associated with ransomware threats among a total of 344 threats identified in 2022 – marking a 19% increase year-over-year. Threat actors are actively searching the internet and deep and dark web for 180 vulnerabilities known […]
February 21, 2023
Via: The Hacker NewsA spear-phishing campaign targeting Indian government entities aims to deploy an updated version of a backdoor called ReverseRAT. Cybersecurity firm ThreatMon attributed the activity to a threat actor tracked as SideCopy. SideCopy is a threat group of Pakistani origin that […]