Source: www.securityweek.com – Author: Ionut Arghire Danish cloud hosting services provider CloudNordic has announced that all its systems were rendered unusable following a ransomware attack. The...
Month: August 2023
UK Court Concludes Teenager Behind Huge Hacking Campaign – Source: www.securityweek.com
Source: www.securityweek.com – Author: AFP A UK court on Wednesday found a teenager responsible for a hacking campaign that included one of the biggest breaches in...
FBI Flags $40M Crypto Cash-Out Plot By North Korean Hackers – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: 1 The Federal Bureau of Investigation (FBI) has issued a stark warning to cryptocurrency firms regarding a surge in blockchain activity linked...
Data of 2.6 Million Duolingo Users Leaked on Hacking Forum – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: 1 Data from 2.6 million users of Duolingo, a language learning platform with over 74 million monthly users, has been leaked on...
New Study Sheds Light on Adhubllka Ransomware Network – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: 1 Cybersecurity researchers have unveiled a complex web of interconnected ransomware strains that trace their origins back to a common source: the...
NIST Publishes Draft Post-Quantum Cryptography Standards – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: 1 Draft post-quantum cryptography (PQC) standards have been published by the US National Institute of Standards and Technology (NIST). The new framework...
Sensitive Data of 10 Million at Risk After French Employment Agency Breach – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: 1 The French national employment agency, Pôle emploi, has been hit by a cyber-attack potentially exposing critical information of up to 10...
Lazarus Group Exploits Critical Zoho ManageEngine Flaw to Deploy Stealthy QuiteRAT Malware – Source:thehackernews.com
Source: thehackernews.com – Author: . Aug 24, 2023THNCyber Attack / Hacking The North Korea-linked threat actor known as Lazarus Group has been observed exploiting a now-patched...
New Telegram Bot “Telekopye” Powering Large-scale Phishing Scams from Russia – Source:thehackernews.com
Source: thehackernews.com – Author: . Aug 24, 2023THNCyber Threat / Phishing A new financially motivated operation is leveraging a malicious Telegram bot to help threat actors...
The Hidden Dangers of Public Wi-Fi – Source:thehackernews.com
Source: thehackernews.com – Author: . Aug 24, 2023The Hacker NewsNetwork Security / DNS Public Wi-Fi, which has long since become the norm, poses threats to not...
New “Whiffy Recon” Malware Triangulates Infected Device Location via Wi-Fi Every Minute – Source:thehackernews.com
Source: thehackernews.com – Author: . Aug 24, 2023THNMalware / Privacy The SmokeLoader malware is being used to deliver a new Wi-Fi scanning malware strain called Whiffy...
WinRAR Security Flaw Exploited in Zero-Day Attacks to Target Traders – Source:thehackernews.com
Source: thehackernews.com – Author: . Aug 24, 2023THNEndpoint Security / Zero-Day A recently patched security flaw in the popular WinRAR archiving software has been exploited as...
Ransomware With an Identity Crisis Targets Small Businesses, Individuals – Source: www.darkreading.com
Source: www.darkreading.com – Author: Elizabeth Montalbano, Contributor, Dark Reading Researchers have identified a new strain of ransomware that dates back to 2019 and targets individuals and...
eBay Users Beware Russian ‘Telekopye’ Telegram Phishing Bot – Source: www.darkreading.com
Source: www.darkreading.com – Author: Nate Nelson, Contributing Writer, Dark Reading Russian-language Telegram users are using a bot to automate end-to-end phishing campaigns against users of popular ecommerce...
What the Hive Ransomware Case Says About RaaS and Cryptocurrency – Source: www.darkreading.com
Source: www.darkreading.com – Author: Ryan Estes, Intrusion Analyst, WatchGuard Technologies Earlier this year, law enforcement officials disrupted the operations of the Hive cybercriminal group, which profited...
5 Best Practices for Implementing Risk-First Cybersecurity – Source: www.darkreading.com
Source: www.darkreading.com – Author: Kaus Phaltankar, Co-Founder & CEO, Caveonix Organizations face an uphill battle to safeguard hybrid cloud assets and sensitive data from evolving cyber...
North Korea’s Lazarus APT Uses GUI Framework to Build Stealthy RAT – Source: www.darkreading.com
Source: www.darkreading.com – Author: Nate Nelson, Contributing Writer, Dark Reading In recent attacks against healthcare organizations and an Internet infrastructure company, North Korea’s famous Lazarus Group...
eSentire Labs Open Sources Project to Monitor LLMs – Source: www.darkreading.com
Source: www.darkreading.com – Author: Dark Reading Staff, Dark Reading eSentire Labs announced the eSentire LLM Gateway, an open source implementation framework that provides security teams with...
Prelude Security Tackles Continuous Security Testing in Containers – Source: www.darkreading.com
Source: www.darkreading.com – Author: Dark Reading Staff, Dark Reading Prelude Security has enhanced its Probes technology to help security teams run continuous security tests on all...
New Windows updates cause UNSUPPORTED_PROCESSOR blue screens – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Sergiu Gatlan Microsoft says the August 2023 preview updates released this week for Windows 11 and Windows 10 systems are causing blue...
New Whiffy Recon malware uses WiFi to triangulate your location – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Bill Toulas Cybercriminals behind the Smoke Loader botnet are using a new piece of malware called Whiffy Recon to triangulate the location...
Exploit released for Ivanti Sentry bug abused as zero-day in attacks – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Sergiu Gatlan Proof-of-concept exploit code is now available for a critical Ivanti Sentry authentication bypass vulnerability that enables attackers to execute code...
Last call for mWISE, the security conference for frontline practitioners. – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Sponsored by Mandiant We’re down to the final weeks of registration for mWISE, the highly targeted, community-focused cybersecurity conference from Mandiant, now...
Hackers use public ManageEngine exploit to breach internet org – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Bill Toulas The North Korean state-backed hacker group tracked as Lazarus has been exploiting a critical vulnerability (CVE-2022-47966) in Zoho’s ManageEngine ServiceDesk...
Lapsus$ teen hackers convicted of high-profile cyberattacks – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Ionut Ilascu A London jury has found that an 18-year-old member of the Lapsus$ data extortion gang helped hack multiple high-profile companies, stole...
Smashing Security podcast #336: Pizza pests, and securing your wearables – Source: grahamcluley.com
Source: grahamcluley.com – Author: Graham Cluley Surely you should be able to order pizza without being pestered for sex? And Carole takes a look at the...
Thousands of Openfire Servers at Risk from Critical CVE – Source: heimdalsecurity.com
Source: heimdalsecurity.com – Author: Mihaela Popa Over 3,000 Openfire servers have yet to be updated against a critical security vulnerability. Tracked as CVE-2023-32315, the flaw has...
Ransomware Vs. Malware: What’s The Difference? – Source: heimdalsecurity.com
Source: heimdalsecurity.com – Author: Gabriella Antal Cyber-attacks can come in many forms. In the world of cybersecurity, the terms “ransomware” and “malware” are often used interchangeably,...
University of Minnesota Reports Massive Data Breach – Source: heimdalsecurity.com
Source: heimdalsecurity.com – Author: Mihaela Popa The University of Minnesota is currently conducting an investigation into a substantial data breach that could potentially impact a large...
Into the Heimdalverse – Source: heimdalsecurity.com
Source: heimdalsecurity.com – Author: Nabil Hey there, fellow digital explorers! Welcome to a journey that promises to take your cybersecurity understanding to a whole new dimension....