News
-
"'Styx Stealer' Malware Developer Accidentally Exposes Personal Info to Researchers in 'Critical OPSEC Error'"Researchers at Check Point found that a suspected developer of the "Styx Stealer" malware made an Operational Security (OPSEC) mistake, leaking client and earnings data from his computer.
-
"PostgreSQL Databases Under Attack"Cryptojacking attackers are targeting poorly protected PostgreSQL databases running on Linux machines. Aqua Security researchers observed the attack on a honeypot system, which began with the threat actors brute-forcing access credentials.
-
"Thousands of Apps Using AWS ALB Exposed to Attacks Due to Configuration Issue"According to the application security company Miggo, about 15,000 apps that use Amazon Web Services' (AWS) Application Load Balancer (ALB) for authentication may be vulnerable to attacks.
-
"New MoonPeak RAT Linked to North Korean Threat Group UAT-5394""MoonPeak," a newly discovered Remote Access Trojan (RAT) family, has been linked to the North Korean threat group "UAT-5394." Cisco Talos research shows that this sophisticated malware, based on the open source "XenoRAT," is actively being developed t
-
"Arden Claims Service Reports Data Breach, 139,000 Affected"Class action litigation claims administration firm Arden Claims Service recently started notifying about 139,000 individuals that their personal information was stolen during an October 2023 data breach.
-
"Most Ransomware Attacks Now Happen at Night"According to security researchers at Malwarebytes, most ransomware attacks now occur between 1 am and 5 am to catch cybersecurity teams off guard.
-
"Healthcare Hit by a Fifth of Ransomware Incidents"According to security researchers at Barracuda Networks, more than a fifth (21%) of ransomware attacks targeted healthcare in the past 12 months, up from 18% in the previous year.
-
"Computer Scientists Discover Vulnerabilities in a Popular Security Protocol"The Remote Authentication Dial-In User Service (RADIUS) protocol, a widely used security protocol dating back to the days of dial-up Internet, has been found to contain vulnerabilities that leave many networked devices exposed to an attack and en
-
"Cybercriminals Exploit File Sharing Services to Advance Phishing Attacks"According to Abnormal Security, threat actors are using popular file-hosting or e-signature solutions to trick victims into revealing private information or downloading malware.
-
"Complicated App Settings Are a Threat to User Privacy"Joseph K. Nwankpa, Miami University Associate Professor of Information Systems and Analytics, points out that default privacy settings are a potential risk to user privacy.
-
"Novel Phishing Method Used in Android/iOS Financial Fraud Campaigns"Czech Republic, Hungary, and Georgia are facing financial fraud campaigns involving a recently discovered sophisticated mobile phishing technique.
-
"Major Backdoor in Millions of RFID Cards Allows Instant Cloning"The French security company Quarkslab found a major backdoor in millions of contactless cards made by Shanghai Fudan Microelectronics Group, a leading Chinese chip manufacturer.