News
-
"Vulnerabilities Allow Hijacking of Most Ransomware to Prevent File Encryption"A researcher named John Page has shown how a type of vulnerability affecting many ransomware families can be exploited to control the malware and terminate it before it can encrypt files on compromised systems. The researcher has been running a project…
-
"Attackers Use Event Logs to Hide Fileless Malware"A never-before-seen technique has been discovered in a malicious campaign that plants fileless malware on target machines. The technique involves the injection of shellcode directly into Windows event logs, which allows malicious actors to use the event…
-
"Pro-Ukrainian DoS Attack Compromises Docker Engine Honeypots to Target Russian, Belarusian Websites"Cybersecurity researchers from CrowdStrike have detected a Denial-of-Service (DoS) attack that has been compromising Docker Engine honeypots to take down Russian and Belarusian websites amid the Russia-Ukraine war. The researchers discovered that the…
-
"Cisco Issues Fresh Warning Over Counterfeit Switches"Cisco has recently issued a "field notice" to advise customers of its Catalyst 2960X/2960XR switches to upgrade the IOS software on their devices to ensure that they are not counterfeit. Counterfeiters often replicate Cisco equipment due to their…
-
"Ransomware Attack Closes Michigan College"Kellogg Community College is located in Michigan and has closed its campuses and canceled classes after falling victim to a cyberattack. Kellogg Community College serves approximately 7000 students annually and was targeted with ransomware on…
-
"Phishers Exploit Google's SMTP Relay Service to Deliver Spoofed Emails"Researchers have observed phishers exploiting a flaw contained by Google's SMTP relay service to deliver malicious emails that spoof popular brands. There has been a significant surge in SMTP relay service exploit attacks in the wild since April 2022.…
-
"Many IoT Devices Exposed to Attacks Due to Unpatched Flaw in uClibc Library"Nozomi Networks, a firm specialized in securing operational technology (OT) and IoT systems, has recently disclosed a potentially severe vulnerability affecting a C standard library used by several major companies. The affected library is uClibc,…
-
"SwRI Develops Cyber Security Intrusion Detection System for Industrial Control Systems"Researchers at the Southwest Research Institute (SwRI) have developed an Intrusion Detection System (IDS) for Industrial Control Systems (ICS). The technology aims to help government and industry improve the detection of cyber threats to industrial…
-
"Newly Discovered Black Basta Ransomware Could be Associated With Conti Gang"At least a dozen firms have been targeted by a new ransomware operation called Black Basta, which is suspected to be linked to the Conti gang. The threat actors behind Black Basta attempt to take large amounts of data from infected systems to further…
-
"Open-Source Security: It's Too Easy to Upload 'Devastating' Malicious Packages, Warns Google"Google has been working on finding malicious code packages sneaked into open source software projects. The Open Source Security Foundation's (OpenSSF) Package Analysis Project aims to help automate the process of identifying malicious packages…
-
"Open-Source Security: It's Too Easy to Upload 'Devastating' Malicious Packages, Warns Google"Google has been working on finding malicious code packages sneaked into open source software projects. The Open Source Security Foundation's (OpenSSF) Package Analysis Project aims to help automate the process of identifying malicious packages…
-
"SolarWinds Hackers Set Up Phony Media Outlets To Trick Targets"Nobelium, the Russian hacking group behind the SolarWinds hack, is setting up new infrastructure to launch attacks using old tricks, researchers at Recorded Future found. The researchers stated that the group has evolved in recent months in an…