News
-
"CISA, DHS, FBI and International Partners Publish Guide for Protecting High-Risk Communities"The US Cybersecurity and Infrastructure Security Agency (CISA), Department of Homeland Security (DHS), and Federal Bureau of Investigation (FBI), in collaboration with international cyber partners have published "Mitigating Cyber Threat
-
"PyPI Package Backdoors Macs Using the Sliver Pen-Testing Suite"A new Python Package Index (PyPI) package mimicked the popular 'requests' library to target macOS devices with the Sliver C2 adversary framework.
-
"Russian Actors Weaponize Legitimate Services in Multi-Malware Attack"Recorded Future has highlighted a cyber campaign carried out by Russian-speaking actors involving the exploitation of GitHub and FileZilla to deploy multiple malware variants.
-
"Botnet Sent Millions of Emails in LockBit Black Ransomware Campaign"According to New Jersey's Cybersecurity and Communications Integration Cell (NJCCIC), millions of phishing emails have been sent through the Phorpiex botnet since April to conduct a large-scale LockBit Black ransomware campaign.
-
"Log4Shell Shows No Sign of Fading, Spotted in 30% of CVE Exploits"According to a Cato Networks survey, organizations still run insecure protocols across their Wide Access Network (WAN), making cybercriminals' movement easier.
-
"Helsinki Suffers Data Breach After Hackers Exploit Unpatched Flaw"The City of Helsinki, located in Finland, is investigating a data breach in its education division, which it discovered in late April 2024, impacting tens of thousands of students, guardians, and personnel.
-
"Heartbleed: When Is It Good to Name a Vulnerability?"Years have passed since the identification of "Heartbleed," a critical OpenSSL vulnerability, but questions remain regarding branded vulnerabilities and the appropriate naming of vulnerabilities.
-
"CISPA Researchers Develop New Security Concept for Zoom Groups"CISPA-Faculty Professor Dr. Cas Cremers, his postdoc Mang Zhao, and Dr. Eyal Ronen have developed a new security method for Zoom, one of the most popular software products for video conferencing.
-
"MITRE Unveils EMB3D: A Threat-Modeling Framework for Embedded Devices"The MITRE Corporation has made "EMB3D," a threat-modeling framework for vendors of embedded devices used in critical infrastructure environments, officially available.
-
"Largest Non-Bank Lender in Australia Warns of a Data Breach"Firstmac Limited just started warning customers that it suffered a data breach a day after the new Embargo cyber-extortion group leaked over 500GB of data allegedly stolen from the firm.
-
"Hackers Use DNS Tunneling for Network Scanning, Tracking Victims"Threat actors have been conducting Domain Name System (DNS) tunneling to track when targets open phishing emails and click on malicious links. They are also applying the method to scan networks for vulnerabilities.
-
"Mallox Ransomware Deployed Via MS-SQL Honeypot Attack"Cyberattackers launching "Mallox" ransomware, also known as "Fargo," "TargetCompany," and "Mawahelper" have applied sophisticated methods, as shown by a recent Microsoft SQL (MS-SQL) honeypot incident.