Transparent Tribe Hackers Distribute CapraRAT via Trojanized Messaging AppsA suspected Pakistan-aligned advanced persistent threat (APT) group known as Transparent Tribe has been linked to an ongoing cyber espionage...
Day: March 14, 2023
Fortinet FortiOS Flaw Exploited in Targeted Cyberattacks on Government Entities
Fortinet FortiOS Flaw Exploited in Targeted Cyberattacks on Government EntitiesGovernment entities and large organizations have been targeted by an unknown threat actor by exploiting a security...
Microsoft Warns of Large-Scale Use of Phishing Kits to Send Millions of Emails Daily
Microsoft Warns of Large-Scale Use of Phishing Kits to Send Millions of Emails DailyAn open source adversary-in-the-middle (AiTM) phishing kit has found a number of takers...
The Prolificacy of LockBit Ransomware
The Prolificacy of LockBit RansomwareToday, the LockBit ransomware is the most active and successful cybercrime organization in the world. Attributed to a Russian Threat Actor, LockBit...
GoBruteforcer: New Golang-Based Malware Breaches Web Servers Via Brute-Force Attacks
GoBruteforcer: New Golang-Based Malware Breaches Web Servers Via Brute-Force AttacksA new Golang-based malware dubbed GoBruteforcer has been found targeting web servers running phpMyAdmin, MySQL, FTP, and Postgres to...
Firefox 111 patches 11 holes, but not 1 zero-day among them…
Firefox 111 patches 11 holes, but not 1 zero-day among them…In the game of cricket, 111 is an unauspicious number, but for Firefox, there doesn't seem...
Stalkerware has grown by 239% worldwide over the past three years
Stalkerware has grown by 239% worldwide over the past three years Over the course of the past three years, Avast researchers have discovered a diverse range...
Using AI Cybersecurity Solutions to Stop Ransomware
Using AI Cybersecurity Solutions to Stop Ransomware Growing interconnectedness makes it harder to detect ransomware before it causes harm. Whether data is processed locally or in...
Netography Detection Model Release – March 13, 2023
Netography Detection Model Release – March 13, 2023The Netography Threat Research Team has released its latest detection model updates, including several optimizations of existing detections to...
Wicked Good Development Episode 29: White House Unveils New National Cybersecurity Strategy
Wicked Good Development Episode 29: White House Unveils New National Cybersecurity Strategy The post Wicked Good Development Episode 29: White House Unveils New National Cybersecurity Strategy appeared...
USENIX Security ’22 – Jinsheng Ba, Marcel Böhme, Zahra Mirzamomen, Abhik Roychoudhury – ‘Stateful Greybox Fuzzing’
USENIX Security ’22 – Jinsheng Ba, Marcel Böhme, Zahra Mirzamomen, Abhik Roychoudhury – ‘Stateful Greybox Fuzzing’Our thanks to USENIX for publishing their Presenter’s outstanding USENIX Security...
The Top 5 Brand Protection Software Solutions in 2023
The Top 5 Brand Protection Software Solutions in 2023Which service providers offer the best brand protection solutions for your business? We have composed a list of...
Cybersecurity Learning Across Sectors – How ICCWS Brings Academics, Government, And Private Companies Together
Cybersecurity Learning Across Sectors – How ICCWS Brings Academics, Government, And Private Companies TogetherThe 18th International Conference on Cyber Warfare and Security gave researchers, policymakers, and...
Fairwinds Insights Basics Tutorial: Avoid Containers Running with Dangerous Capabilities
Fairwinds Insights Basics Tutorial: Avoid Containers Running with Dangerous Capabilities Containers are standard units of software that package code and its related dependencies to enable applications...
What to Expect During a SOX Compliance Audit
What to Expect During a SOX Compliance Audit In 2002, the Public Company Accounting Oversight Board (PCAOB) created the Sarbanes-Oxley Act (SOX) due to major corporate...
Randall Munroe’s XKCD ‘Radians Are Cursed’
Randall Munroe’s XKCD ‘Radians Are Cursed’ via the comic artistry and dry wit of Randall Munroe, resident at XKCD! Permalink The post Randall Munroe’s XKCD ‘Radians...
UK refreshes national security plan to stop more of China’s secret-stealing cyber-tricks
UK refreshes national security plan to stop more of China's secret-stealing cyber-tricksA threat that needs two orgs to tackle it: the 'Integrated Security Fund' and the...
IBM partners up with Cohesity for better data defense in new storage suite
IBM partners up with Cohesity for better data defense in new storage suiteData security and protection are the main upside for IBM’s upcoming storage offering, which...
Can a quantum algorithm crack RSA cryptography? Not yet
Can a quantum algorithm crack RSA cryptography? Not yetEvery CISO has encryption implementation decisions to make at a variety of levels and instances as they sort...
Amazon-owned Ring reportedly suffers ransomware attack
Amazon-owned Ring reportedly suffers ransomware attackRing, a home security and smart home company owned by Amazon, has reportedly suffered a ransomware attack by Russia-linked ALPHV group, according...
ReversingLabs adds new context-based secret detection capabilities
ReversingLabs adds new context-based secret detection capabilitiesReversingLabs has added new secret detection capabilities to its software supply chain security (SSCS) tool to help developers prioritize remediation...
Universities and colleges cope silently with ransomware attacks
Universities and colleges cope silently with ransomware attacksAlthough some cybersecurity researchers say that ransomware attacks are on the downswing as cybercriminals face declining payments, a spate...
MI5 Launches New Agency to Tackle State-Backed Attacks
MI5 Launches New Agency to Tackle State-Backed AttacksNational Protective Security Authority begins its workRead MoreNational Protective Security Authority begins its work
UK Crypto Firm Loses $200m in Cyber-Attack
UK Crypto Firm Loses $200m in Cyber-AttackEuler Finance suffered "flash loan" attackRead MoreEuler Finance suffered "flash loan" attack
LA Housing Authority Suffers Year-Long Breach
LA Housing Authority Suffers Year-Long BreachLockBit ransomware group stole data and encrypted filesRead MoreLockBit ransomware group stole data and encrypted files
CISA Creates New Ransomware Vulnerability Warning Program
CISA Creates New Ransomware Vulnerability Warning ProgramThe Agency will warn critical infrastructure entities to enable mitigation before an incidentRead MoreThe Agency will warn critical infrastructure entities...
DEV-1101 Updates Open Source Phishing Kit
DEV-1101 Updates Open Source Phishing KitThe kit is written in NodeJS and has automated setup and detection evasion capabilitiesRead MoreThe kit is written in NodeJS and...
YoroTrooper Espionage Campaigns Target CIS, EU Countries
YoroTrooper Espionage Campaigns Target CIS, EU CountriesThe threat actors mainly targeted organizations across Azerbaijan, Tajikistan and KyrgyzstanRead MoreThe threat actors mainly targeted organizations across Azerbaijan, Tajikistan...
Dissecting the malicious arsenal of the Makop ransomware gang
Dissecting the malicious arsenal of the Makop ransomware gangCyber security researcher Luca Mella analyzed the Makop ransomware employed in a recent intrusion. Executive summary Insights from...
Advanced actor targets Fortinet FortiOS in attacks on govt entities
Advanced actor targets Fortinet FortiOS in attacks on govt entitiesAn unknown threat actor is targeting Government entities and large organizations by exploiting a security flaw in...