March 16, 2023
Via: TechradarAn unnamed U.S. civilian executive branch has unintentionally been feeding intel to cybercriminals and state-sponsored threat actors for six months, a new report from the country’s law enforcement and intelligence agencies claims. Earlier this week, the Cybersecurity and Infrastructure Security […]
March 13, 2023
Via: The Hacker NewsThreat actors have been increasingly observed using AI-generated YouTube Videos to spread a variety of stealer malware such as Raccoon, RedLine, and Vidar. “The videos lure users by pretending to be tutorials on how to download cracked versions of software […]
February 28, 2023
Via: Tech XploreCybercriminals are coming up with increasingly savvy ways to disrupt online services, access sensitive data or crash internet user’s devices. A cyber-attack that has become very common over the past decades is the so-called Distributed Denial of Service (DDoS) attack. […]
February 24, 2023
Via: PhoneArenaThere’s a new malware roaming free online right now. It hijacks people’s social media accounts, steals login credentials, and mines cryptocurrencies using people’s devices, reports TechRadar. New malware exploits users’ YouTube and Facebook account The info comes from researchers from […]
February 23, 2023
Via: The Hacker NewsTrojanized versions of legitimate applications are being used to deploy evasive cryptocurrency mining malware on macOS systems. Jamf Threat Labs, which made the discovery, said the XMRig coin miner was executed by means of an unauthorized modification in Final Cut […]
February 23, 2023
Via: Tech XploreA cybersecurity technique that shuffles network addresses like a blackjack dealer shuffles playing cards could effectively befuddle hackers gambling for control of a military jet, commercial airliner or spacecraft, according to new research. However, the research also shows these defenses […]
February 11, 2023
Via: TechradarCybersecurity researchers from Proofpoint have uncovered a brand new, custom-built malware being used by threat actors to deliver a wide variety of specifically tailored stage-two attacks. These payloads are capable of different things, from espionage to data theft, making the […]
February 8, 2023
Via: The Hacker NewsTo succeed as a cybersecurity analyst, you need to understand the traits, values, and thought processes of hackers, along with the tools they use to launch their attacks. During a webinar called The Hacker Mindset, a Red Team Researcher shared […]
February 3, 2023
Via: The VergeA former employee of network technology provider Ubiquiti pleaded guilty to multiple felony charges on Thursday after posing as an anonymous hacker in an attempt to extort almost $2 million worth of cryptocurrency while employed at the company. Nickolas Sharp, […]
January 31, 2023
Via: TechradarA new cyberattack that appears to be targeted at Ukraine and is designed to overwrite crucial Windows files has been spotted by security firm ESET. “On January 25th #ESETResearch discovered a new cyberattack in Ukraine. Attackers deployed a new wiper […]
January 26, 2023
Via: TechradarStaying safe from cyberattacks is getting tougher all the time, with a new BlackBerry report highlighting the sheer volume of attacks that take place every day. During the three-month period between September and November 2022, BlackBerry found its AI-driven preventative […]
January 26, 2023
Via: TechSpotIn September 2022, the CISA performed audits on several FCEB networks and found them to have been victim to a “widespread, financially motivated phishing campaign.” A month later, security researchers at Silent Push reported on a “typosquatting” trojan campaign involving […]
January 23, 2023
Via: TechradarCybersecurity experts have warnedd of a new Android malware capable of taking over the target endpoint(opens in new tab) and using it to steal data, exfiltrate personally identifiable information (PII), and make financial transactions. Discovered by researchers at security firm […]
January 20, 2023
Via: The Hacker NewsA suspected China-nexus threat actor exploited a recently patched vulnerability in Fortinet FortiOS SSL-VPN as a zero-day in attacks targeting a European government entity and a managed service provider (MSP) located in Africa. Telemetry evidence gathered by Google-owned Mandiant indicates […]
January 13, 2023
Via: TechradarPersonal and employee data is a goldmine for hackers, who are now apparently more focused on obtaining these types of data than any other, new research has claimed. A report from Imperva analyzing 100 data breach reports published in the […]
January 11, 2023
Via: TechradarA dangerous new cybercrime group has been spotted targeting government agencies and military organizations in the Asia-Pacific region. According to multiple cybersecurity firms who spotted the threat actor, it seems to be deploying unorthodox tactics to obtain sensitive information from […]
January 9, 2023
Via: TechradarVSCode Marketplace, a repository for Visual Studio Code (VSC) externsions, has poor security defenses, allowing threat actors to abuse it and distribute malicious code among the millions of its users, experts have warned. A report from AquaSec tested the platform […]
January 9, 2023
Via: TechradarTurla, a known Russian threat actor allegedly tied to the Kremlin, was observed recycling a decade-old and defunct malware to gain access to endpoints in Ukraine and spy on its targets. A report by cybersecurity experts Mandiant found that in […]
January 6, 2023
Via: The Hacker NewsA South Africa-based threat actor known as Automated Libra has been observed employing CAPTCHA bypass techniques to create GitHub accounts in a programmatic fashion as part of a freejacking campaign dubbed PURPLEURCHIN. The group “primarily targets cloud platforms offering limited-time […]
January 3, 2023
Via: TechradarOver the course of 2022, more than 200 large public sector organizations in the United States were impacted by ransomware(opens in new tab) attacks. Cybersecurity experts Emsisoft claims firms in the government, education, and healthcare industries were most affected, having […]