Malware authors leverage more attack techniques that enable lateral movementA new study of over a half-million malware samples collected from various sources in 2022 revealed that...
Month: February 2023
Cybersecurity startups to watch for in 2023
Cybersecurity startups to watch for in 2023The problems cybersecurity startups attempt to solve are often a bit ahead of the mainstream. They can move faster than...
Gcore Thwarts Massive 650 Gbps DDoS Attack on Free Plan Client
Gcore Thwarts Massive 650 Gbps DDoS Attack on Free Plan ClientAt the beginning of January, Gcore faced an incident involving several L3/L4 DDoS attacks with a...
Threat Actors Adopt Havoc Framework for Post-Exploitation in Targeted Attacks
Threat Actors Adopt Havoc Framework for Post-Exploitation in Targeted AttacksAn open source command-and-control (C2) framework known as Havoc is being adopted by threat actors as an...
Hydrochasma: New Threat Actor Targets Shipping Companies and Medical Labs in Asia
Hydrochasma: New Threat Actor Targets Shipping Companies and Medical Labs in AsiaShipping companies and medical laboratories in Asia have been the subject of a suspected espionage...
3 Steps to Automate Your Third-Party Risk Management Program
3 Steps to Automate Your Third-Party Risk Management ProgramIf you Google "third-party data breaches" you will find many recent reports of data breaches that were either...
Attackers Flood NPM Repository with Over 15,000 Spam Packages Containing Phishing Links
Attackers Flood NPM Repository with Over 15,000 Spam Packages Containing Phishing LinksIn what's a continuing assault on the open source ecosystem, over 15,000 spam packages have flooded the...
Apple Warns of 3 New Vulnerabilities Affecting iPhone, iPad, and Mac Devices
Apple Warns of 3 New Vulnerabilities Affecting iPhone, iPad, and Mac DevicesApple has revised the security advisories it released last month to include three new vulnerabilities impacting iOS, iPadOS,...
Python Developers Warned of Trojanized PyPI Packages Mimicking Popular Libraries
Python Developers Warned of Trojanized PyPI Packages Mimicking Popular LibrariesCybersecurity researchers are warning of "imposter packages" mimicking popular libraries available on the Python Package Index (PyPI)...
New S1deload Malware Hijacking Users’ Social Media Accounts and Mining Cryptocurrency
New S1deload Malware Hijacking Users' Social Media Accounts and Mining CryptocurrencyAn active malware campaign has set its sights on Facebook and YouTube users by leveraging a...
Lazarus Group Likely Using New WinorDLL64 Backdoor to Exfiltrate Sensitive Data
Lazarus Group Likely Using New WinorDLL64 Backdoor to Exfiltrate Sensitive DataA new backdoor associated with a malware downloader named Wslink has been discovered, with the tool likely used...
New Hacking Cluster ‘Clasiopa’ Targeting Materials Research Organizations in Asia
New Hacking Cluster 'Clasiopa' Targeting Materials Research Organizations in AsiaMaterials research organizations in Asia have been targeted by a previously unknown threat actor using a distinct...