News
-
"Two More Individuals Charged for DraftKings Hacking"Two more individuals have recently been indicted for their role in a credential stuffing attack resulting in unauthorized access to thousands of user accounts at a fantasy sports and betting website.
-
"Hackers Push USB Malware Payloads via News, Media Hosting Sites"A threat actor who uses USB devices for initial infection has been discovered abusing legitimate online platforms such as GitHub, Vimeo, and Ars Technica to host encoded payloads hidden in content that appears to be harmless.
-
"Interpol Arrests More Than 30 Cybercriminals in Global 'Synergia' Operation"International law enforcement has detained 31 suspected cybercriminals and discovered 1,300 malicious servers used to conduct phishing attacks and distribute malware. Interpol's Operation Synergia ran from September to November 2023.
-
"Tor Code Audit Finds 17 Vulnerabilities"A comprehensive code security audit focusing on several components of the Tor anonymity network conducted by researchers at Radically Open Security discovered more than a dozen vulnerabilities, including an issue classified as "high risk." The re
-
"PurpleFox Malware Infected Thousands of Systems in Ukraine"The Computer Emergency Response Team in Ukraine (CERT-UA) recently warned about a PurpleFox malware campaign that has infected at least 2,000 computers in the country.
-
"US Feds Shut Down China-Linked 'KV-Botnet' Targeting SOHO Routers"The US government took action to neutralize a botnet of hundreds of US-based Small Office and Home Office (SOHO) routers hijacked by Volt Typhoon, a China-linked Advanced Persistent Threat (APT) actor.
-
"FritzFrog Botnet Exploits Log4Shell, PwnKit Vulnerabilities"The FritzFrog cryptocurrency mining botnet is growing as a recently analyzed variant exploits the Log4Shell and PwnKit vulnerabilities for lateral movement and privilege escalation.
-
"'Leaky Vessels' Cloud Bugs Allow Container Escapes Globally"Researchers have discovered four vulnerabilities, collectively called "Leaky Vessels," in container engine components. Three of the vulnerabilities enable attackers to break out of containers and perform malicious actions on the host system.
-
"Pump-and-Dump Schemes Make Crypto Fraudsters $240m"According to security researchers at Chainalysis, market manipulators may have made over $240m last year by artificially inflating the value of Ethereum tokens.
-
"New NCCoE Guide Helps Major Industries Observe Incoming Data While Using Latest Internet Security Protocol"The National Institute of Standards and Technology (NIST) has released a practice guide covering methods aimed at helping major industries implement the Internet security protocol TLS 1.3, as well as conduct network monitoring and auditing safely
-
"Europcar Dismisses Data Leak Claims as AI Fake"Europcar, a global car rental company, has denied claims of a data breach, arguing that the Europcar data posted online by threat actors was generated using ChatGPT, the Artificial Intelligence (AI)-powered chatbot.
-
"Telegram Marketplaces Fuel Phishing Attacks with Easy-to-Use Kits and Malware"According to Guardio Labs researchers, the phishing ecosystem has been made highly accessible due to Telegram's emergence as a hub for cybercrime, allowing threat actors to launch massive attacks inexpensively.