News
-
"Hackers Hijack Antivirus Updates to Drop GuptiMiner Malware"North Korean hackers have been exploiting eScan antivirus' updating mechanism to install backdoors on large corporate networks and deliver cryptocurrency miners via "GuptiMiner" malware.
-
"Synlab Italia Suspends Operations Following Ransomware Attack"Synlab Italia has recently suspended all its medical diagnostic and testing services after a ransomware attack forced its IT systems to be taken offline.
-
"Siemens Industrial Product Impacted by Exploited Palo Alto Firewall Vulnerability"The recently disclosed Palo Alto Networks firewall vulnerability tracked as CVE-2024-3400, which has been exploited in attacks for at least one month, has recently been found to impact one of Siemens’ industrial products.
-
"Russian Sandworm Group Hit 20 Ukrainian Energy and Water Sites"According to Ukraine's Community Emergency Response Team (CERT-UA), Russia's APT44, also known as "Sandworm," launched an attack on Ukrainian critical infrastructure in March.
-
"Google Mandiant Report Finds Surprising Fall in Time to Detect Cyber Intrusions"According to Mandiant's 15th annual M-Trends 2024 report, global median dwell time, or the average amount of time attackers remain undetected on a target's network after gaining unauthorized access, has reached the lowest point in over a decade.
-
"Ransomware Gang Leaks Data Allegedly Stolen From Government Contractor"The LockBit ransomware gang has recently leaked 1Gb of data allegedly stolen from the District of Columbia’s Department of Insurance, Securities and Banking (DISB).
-
"DeFake Tool Protects Voice Recordings From Cybercriminals"Ning Zhang, an assistant professor of computer science and engineering at Washington University in St.
-
"Microsoft: APT28 Hackers Exploit Windows Flaw Reported by NSA"Microsoft warns that the Russian threat group "APT28" uses "GooseEgg," a previously unknown hacking tool, to exploit a Windows Print Spooler vulnerability.
-
"Dependency Confusion Vulnerability Found in Apache Project"Researchers at Legit Security discovered a dependency confusion vulnerability in an archived Apache project.
-
"Researchers Uncover Windows Flaws Granting Hackers Rootkit-Like Powers"According to new research, threat actors can use the DOS-to-NT path conversion process to achieve rootkit-like capabilities and conduct malicious activities such as concealing and impersonating files, directories, and processes.
-
"Thousands of Palo Alto Firewalls Potentially Impacted by Exploited Vulnerability"According to the Shadowserver Foundation, a recently addressed vulnerability could affect about 6,000 Internet-accessible Palo Alto Networks firewalls.