April 24, 2024
Via: Help Net SecurityA staggering increase in QR code phishing (quishing) attacks during 2023 saw them skyrocket up the list of concerns for cyber teams globally, according to Egress. Attacks were both prolific and highly successful, demonstrating how cybercriminals effectively combine available technology […]
April 23, 2024
Via: Security AffairsThe US Department of State is imposing visa restrictions on 13 individuals involved in the development and sale of commercial spyware or their immediate family members. The measure aims to counter the misuse of surveillance technology targeting journalists, academics, human […]
April 22, 2024
Via: DataBreach TodayRussian hackers are increasingly targeting messenger apps popular among Ukrainian warfighters with malware as part of an effort “to identify priority targets” for physical attacks, according to Kyiv’s primary cyber incident response team. Ukraine’s Computer Emergency Response Team said messenger […]
Threats & Malware, Vulnerabilities
April 22, 2024
Via: TechRadarThe not-for-profit research and development organization MITRE suffered a cyberattack early this year, with the attack apparently hindering some operations, but there was no talk of stolen data. In a breach notification published on the MITRE website late last week, […]
April 22, 2024
Via: The Hacker NewsMicrosoft has revealed that North Korea-linked state-sponsored cyber actors has begun to use artificial intelligence (AI) to make its operations more effective and efficient. “They are learning to use tools powered by AI large language models (LLM) to make their […]
April 16, 2024
Via: CSO OnlineYour company’s intellectual property—whether that’s patents, trade secrets or just employee know-how—may be more valuable than your physical assets. Here’s to establish basic policies and procedures for IP protection. Intellectual property (IP) is the lifeblood of every organization. It didn’t […]
April 16, 2024
Via: Security AffairsThe Dark Angels (Dunghill) ransomware group claims responsibility for hacking chipmaker Nexperia and stealing 1 TB of the company’s data. Nexperia is a semiconductor manufacturer headquartered in Nijmegen, the Netherlands. It is a subsidiary of the partially state-owned Chinese company […]
April 15, 2024
Via: Security AffairsA joint law enforcement operation conducted by the Australian Federal Police (AFP) and the FBI resulted in the arrest and charging of two individuals suspected of creating and selling the Firebird RAT, which was later renamed as Hive. Australian Federal […]
Mobile, Mobile security, Threats & Malware, Virus & Malware
April 15, 2024
Via: The Hacker NewsCybersecurity researchers have discovered a “renewed” cyber espionage campaign targeting users in South Asia with the aim of delivering an Apple iOS spyware implant called LightSpy. “The latest iteration of LightSpy, dubbed ‘F_Warehouse,’ boasts a modular framework with extensive spying […]
April 15, 2024
Via: Security AffairsIndustrial and enterprise IoT cybersecurity firm Claroty reported that the Ukrainian Blackjack hacking group claims to have damaged emergency detection and response capabilities in Moscow and beyond the Russian capital using a destructive ICS malware dubbed Fuxnet. The Blackjack group […]
April 10, 2024
Via: Panda SecurityRewards For Justice (RFJ), a U.S. government interagency rewards program. Offers up to $10 million reward for any information that could lead to the identification or location of any person from the ALPHV cyber gang, also known as BlackCat, who […]
Threats & Malware, Vulnerabilities
April 9, 2024
Via: TechRadarBack in January, we reported on a small security update patch for Windows 10 that brought on a lot of headaches for IT admins and brought on a veritable cavalcade of error codes. Microsoft promised a fix was in the […]
April 8, 2024
Via: The RegisterHome Depot has confirmed that a third-party company accidentally exposed some of its employees’ personal details after a criminal copy-pasted the data online. In a statement to The Register, Home Depot spokesperson Beth Marlowe said: “A third-party SaaS vendor inadvertently […]
Threats & Malware, Vulnerabilities
April 8, 2024
Via: TechRadarMultiple generative AI models uploaded to Hugging Face were found to be vulnerable in a way that allowed threat actors to run malicious code and extract sensitive user information. This is according to a new report from the cloud security […]
April 8, 2024
Via: Dark ReadingThe sophisticated threat group behind a complex JavaScript remote access Trojan (RAT) known as JSOutProx has released a new version of the malware to target organizations in the Middle East. Cybersecurity services firm Resecurity analyzed technical details of multiple incidents […]
April 2, 2024
Via: The Hacker NewsThe threat actor known as TA558 has been attributed to a new massive phishing campaign that targets a wide range of sectors in Latin America with the goal of deploying Venom RAT. The attacks primarily singled out hotel, travel, trading, […]
April 2, 2024
Via: The RegisterThe FCC appears to finally be stepping up efforts to secure decades-old flaws in American telephone networks that are allegedly being used by foreign governments and surveillance outfits to remotely spy on and monitor wireless devices. At issue are the […]
Threats & Malware, Virus & Malware
April 1, 2024
Via: The Hacker NewsDespite a plethora of available security solutions, more and more organizations fall victim to Ransomware and other threats. These continued threats aren’t just an inconvenience that hurt businesses and end users – they damage the economy, endanger lives, destroy businesses […]
Threats & Malware, Virus & Malware
April 1, 2024
Via: Security AffairsJamf Threat Labs researchers analyzed info stealer malware attacks targeting macOS users via malicious ads and rogue websites. One of the attacks spotted by the researchers relied on sponsored ads proposed to the users while searching for “Arc Browser” on […]
Mobile, Mobile security, Threats & Malware, Virus & Malware
April 1, 2024
Via: The Hacker NewsThe Android banking trojan known as Vultur has resurfaced with a suite of new features and improved anti-analysis and detection evasion techniques, enabling its operators to remotely interact with a mobile device and harvest sensitive data. “Vultur has also started […]