Advertisement
Top

Tag: Featured


Cyber-crime, Phishing

AI set to play key role in future phishing attacks

April 24, 2024

Via: Help Net Security

A staggering increase in QR code phishing (quishing) attacks during 2023 saw them skyrocket up the list of concerns for cyber teams globally, according to Egress. Attacks were both prolific and highly successful, demonstrating how cybercriminals effectively combine available technology […]


Hacker, Threats & Malware

U.S. Gov imposed Visa restrictions on 13 individuals linked to commercial spyware activity

April 23, 2024

Via: Security Affairs

The US Department of State is imposing visa restrictions on 13 individuals involved in the development and sale of commercial spyware or their immediate family members. The measure aims to counter the misuse of surveillance technology targeting journalists, academics, human […]


Cyber warfare, Cyber-crime

Report: Russian Hackers Targeting Ukrainian Soldiers on Apps

April 22, 2024

Via: DataBreach Today

Russian hackers are increasingly targeting messenger apps popular among Ukrainian warfighters with malware as part of an effort “to identify priority targets” for physical attacks, according to Kyiv’s primary cyber incident response team. Ukraine’s Computer Emergency Response Team said messenger […]


Threats & Malware, Vulnerabilities

MITRE says it was hit by hackers exploiting Ivanti flaws

April 22, 2024

Via: TechRadar

The not-for-profit research and development organization MITRE suffered a cyberattack early this year, with the attack apparently hindering some operations, but there was no talk of stolen data. In a breach notification published on the MITRE website late last week, […]


Hacker, Threats & Malware

Microsoft Warns: North Korean Hackers Turn to AI-Fueled Cyber Espionage

April 22, 2024

Via: The Hacker News

Microsoft has revealed that North Korea-linked state-sponsored cyber actors has begun to use artificial intelligence (AI) to make its operations more effective and efficient. “They are learning to use tools powered by AI large language models (LLM) to make their […]


Privacy protection, Security

10 tips to keep IP safe

April 16, 2024

Via: CSO Online

Your company’s intellectual property—whether that’s patents, trade secrets or just employee know-how—may be more valuable than your physical assets. Here’s to establish basic policies and procedures for IP protection. Intellectual property (IP) is the lifeblood of every organization. It didn’t […]


Cyber-crime, Identity theft

Ransomware group Dark Angels claims the theft of 1TB of data from chipmaker Nexperia 

April 16, 2024

Via: Security Affairs

The Dark Angels (Dunghill) ransomware group claims responsibility for hacking chipmaker Nexperia and stealing 1 TB of the company’s data. Nexperia is a semiconductor manufacturer headquartered in Nijmegen, the Netherlands. It is a subsidiary of the partially state-owned Chinese company […]


Hacker, Threats & Malware

U.S. and Australian police arrested Firebird RAT author and operator

April 15, 2024

Via: Security Affairs

A joint law enforcement operation conducted by the Australian Federal Police (AFP) and the FBI resulted in the arrest and charging of two individuals suspected of creating and selling the Firebird RAT, which was later renamed as Hive. Australian Federal […]


Mobile, Mobile security, Threats & Malware, Virus & Malware

Chinese-Linked LightSpy iOS Spyware Targets South Asian iPhone Users

April 15, 2024

Via: The Hacker News

Cybersecurity researchers have discovered a “renewed” cyber espionage campaign targeting users in South Asia with the aim of delivering an Apple iOS spyware implant called LightSpy. “The latest iteration of LightSpy, dubbed ‘F_Warehouse,’ boasts a modular framework with extensive spying […]


Cyber warfare, Cyber-crime

Ukrainian Blackjack group used ICS malware Fuxnet against Russian targets

April 15, 2024

Via: Security Affairs

Industrial and enterprise IoT cybersecurity firm Claroty reported that the Ukrainian Blackjack hacking group claims to have damaged emergency detection and response capabilities in Moscow and beyond the Russian capital using a destructive ICS malware dubbed Fuxnet. The Blackjack group […]


Hacker, Threats & Malware

Rewards For Justice offers up to $10 million reward for info on ALPHV BlackCat hacker group leaders

April 10, 2024

Via: Panda Security

Rewards For Justice (RFJ), a U.S. government interagency rewards program. Offers up to $10 million reward for any information that could lead to the identification or location of any person from the ALPHV cyber gang, also known as BlackCat, who […]


Threats & Malware, Vulnerabilities

Windows 10 latest update is broken and riddled with bugs – with no fix in sight

April 9, 2024

Via: TechRadar

Back in January, we reported on a small security update patch for Windows 10 that brought on a lot of headaches for IT admins and brought on a veritable cavalcade of error codes. Microsoft promised a fix was in the […]


Data loss, Threats & Malware

Home Depot confirms worker data leak after miscreant dumps info online

April 8, 2024

Via: The Register

Home Depot has confirmed that a third-party company accidentally exposed some of its employees’ personal details after a criminal copy-pasted the data online. In a statement to The Register, Home Depot spokesperson Beth Marlowe said: “A third-party SaaS vendor inadvertently […]


Threats & Malware, Vulnerabilities

Hugging Face says it fixed some worrying security issues, moves to boost online protection

April 8, 2024

Via: TechRadar

Multiple generative AI models uploaded to Hugging Face were found to be vulnerable in a way that allowed threat actors to run malicious code and extract sensitive user information. This is according to a new report from the cloud security […]


Cyber-crime, Malware

Solar Spider Spins Up New Malware to Entrap Saudi Arabian Financial Firms

April 8, 2024

Via: Dark Reading

The sophisticated threat group behind a complex JavaScript remote access Trojan (RAT) known as JSOutProx has released a new version of the malware to target organizations in the Middle East. Cybersecurity services firm Resecurity analyzed technical details of multiple incidents […]


Cyber-crime, Phishing

Massive Phishing Campaign Strikes Latin America: Venom RAT Targeting Multiple Sectors

April 2, 2024

Via: The Hacker News

The threat actor known as TA558 has been attributed to a new massive phishing campaign that targets a wide range of sectors in Latin America with the goal of deploying Venom RAT. The attacks primarily singled out hotel, travel, trading, […]


Mobile, Mobile security

Feds finally decide to do something about years-old SS7 spy holes in phone networks

April 2, 2024

Via: The Register

The FCC appears to finally be stepping up efforts to secure decades-old flaws in American telephone networks that are allegedly being used by foreign governments and surveillance outfits to remotely spy on and monitor wireless devices. At issue are the […]


Threats & Malware, Virus & Malware

Detecting Windows-based Malware Through Better Visibility

April 1, 2024

Via: The Hacker News

Despite a plethora of available security solutions, more and more organizations fall victim to Ransomware and other threats. These continued threats aren’t just an inconvenience that hurt businesses and end users – they damage the economy, endanger lives, destroy businesses […]


Threats & Malware, Virus & Malware

Info stealer attacks target macOS users

April 1, 2024

Via: Security Affairs

Jamf Threat Labs researchers analyzed info stealer malware attacks targeting macOS users via malicious ads and rogue websites. One of the attacks spotted by the researchers relied on sponsored ads proposed to the users while searching for “Arc Browser” on […]


Mobile, Mobile security, Threats & Malware, Virus & Malware

Vultur Android Banking Trojan Returns with Upgraded Remote Control Capabilities

April 1, 2024

Via: The Hacker News

The Android banking trojan known as Vultur has resurfaced with a suite of new features and improved anti-analysis and detection evasion techniques, enabling its operators to remotely interact with a mobile device and harvest sensitive data. “Vultur has also started […]