News
-
"Trojanized Installers Used to Distribute Bumblebee Malware"Security researchers at Securework's Counter Threat Unit discovered that popular software tools such as Zoom, Cisco AnyConnect, ChatGPT, and Citrix Workspace have been trojanized to distribute the malware known as Bumblebee. The researchers noted…
-
"Chinese-Language Threat Group Targeted a Dozen South Korean Institutions"A Chinese-language threat group targeted South Korean research and academic institutions with data exfiltration attacks in January. Researchers from Recorded Future's Insikt Group suspect that the threat actors affiliated with the group have launched a…
-
"CFPB Employee Sends 256,000 Consumers' Data to Personal Email"An employee from the US Consumer Financial Protection Bureau (CFPB) has reportedly forwarded confidential records of roughly 256,000 consumers and confidential supervisory information of approximately 50 institutions to a personal email account. …
-
"Pipedream Malware Can Disrupt or Destroy Industrial Systems"According to a report by the industrial cybersecurity company Dragos, the Chernovite threat group developed a new modular malware called Pipedream to target Industrial Control Systems (ICS). This toolkit is capable of launching disruptive and destructive…
-
"With AI Watermarking, Creators Strike Back: Backdoor Attacks Regulate Unauthorized Uses of Copyrighted or Restricted Data"Artificial Intelligence (AI) models rely on massive data sets to train their complex algorithms, but the use of these data sets for training purposes can sometimes violate the rights of the data owners. However, proving that a model used a data set…
-
"The IRS Is Sending Four Investigators Across the World to Fight Cybercrime"Beginning this summer, the Internal Revenue Service (IRS) will send four cybercrime investigators to Australia, Singapore, Colombia, and Germany, marking a significant expansion of the IRS's global efforts to combat cybercrimes, such as those involving…
-
"DHS Announces AI Task Force, Security Sprint on China-Related Threats"The US Department of Homeland Security (DHS) announced two initiatives that will directly contribute to US strategies for defending critical infrastructure and essential services against cyberattacks, physical attacks, Artificial Intelligence (AI), and…
-
"Lazarus Group Adds Linux Malware to Arsenal in Operation Dream Job"The Lazarus Group, a notorious state-sponsored threat actor with ties to North Korea, has been linked to a new campaign targeting Linux users. According to a new report by ESET, the attacks are part of a persistent and long-running activity known as…
-
"Outdated Cybersecurity Practices Leave Door Open for Criminals"According to ExtraHop, organizations experienced a considerable increase in ransomware, from an average of four attacks over five years in 2021 to four attacks over one year in 2022. Eighty-three percent of victims confessed to having paid the ransom at…
-
"Attackers Use Abandoned WordPress Plugin to Backdoor Websites"Attackers are injecting stealthy backdoors into websites using Eval PHP, an outdated WordPress plugin. Eval PHP is an outdated WordPress plugin that enables site administrators to embed PHP code on WordPress pages and posts, which is then executed when…
-
"'GhostToken' Opens Google Accounts to Permanent Infection"A security flaw in Google's Cloud Platform (GCP) could have allowed cybercriminals to hide an unremovable, malicious app within a victim's Google account, rendering the account permanently infected. The "GhostToken" vulnerability was identified and…
-
"North Korean Hacker Suspected in 3CX Software Supply Chain Attack"The 3CX Desktop App software has been reportedly compromised via a prior software supply chain breach, with a North Korean actor suspected to be responsible. Security researchers at Mandiant stated the initial compromise was traced back to malware…