News
-
"Rackspace Ransomware Attack Was Executed by Using Previously Unknown Security Exploit"The Play ransomware group breached the Rackspace Hosted Exchange email system using the MS Exchange exploit chain recently disclosed by Crowdstrike researchers. The attack combines CVE-2022-41082, a Remote Code Execution (RCE) flaw, and CVE-2022-41080, a…
-
"Russia-Linked Turla APT Sneakily Co-Opts Ancient Andromeda USB Infections"A hacking gang, believed to be the Russia-linked Turla Team, reregistered at least three domains associated with the decade-old Andromeda malware, enabling the group to deploy its own espionage and surveillance tools on Ukrainian targets. According to…
-
"Gotta Catch 'Em All: Cybercriminals Target Victims With Fake Pokémon Game"Cybersecurity researchers at the AhnLab Security Emergency Response Center (ASEC) in South Korea have found a phishing campaign that aims to spread malware using a fake Pokémon NFT game. ASEC discovered at least two phishing pages masquerading as a…
-
"Malicious PyPI Packages Create Cloudflare Tunnels to Bypass Firewalls"Six malicious packages were discovered on the Python Package Index (PyPI), installing information-stealing and Remote Access Trojan (RAT) malware leveraging Cloudflare Tunnel to circumvent firewall rules for remote access. The malicious packages aim to…
-
"Hackers Can Abuse Visual Studio Marketplace to Target Developers with Malicious Extensions"A new attack vector aimed at the Visual Studio (VS) Code extensions marketplace could be used to upload malicious extensions masquerading as their official equivalents in order to launch supply chain attacks. Ilay Goldman, a security researcher at Aqua,…
-
"Latest Phishing Campaign Hits Zoom Users With Malware"According to Cyble Research and Intelligence Labs (CRIL), IcedID malware was used in a phishing campaign targeting Zoom users. Attackers use the banking Trojan IcedID, also known as BokBot, to steal victims' banking credentials. This malware targets…
-
“Preparing Businesses for the Quantum Era”Quantum computer and cryptography research has emerged as a crucial tool for digital security in order to tackle cybersecurity threats. Dr. Michele Mosca is a Combinatorics and Optimization professor at the University of Waterloo and a member of the…
-
"How Hackers Might Be Exploiting ChatGPT"The popular Artificial Intelligence (AI) chatbot ChatGPT could be exploited by threat actors to hack into target networks with relative ease. The Cybernews research team uncovered that the AI-based chatbot ChatGPT, a recently launched platform that…
-
"Grand Jury Indicts Suspects Who Hijacked Ring Cameras to Livestream Swatting Attacks"Two suspects have beeen charged by federal prosecutors in the Central District of California with swatting attacks that used hacked Ring cameras to livestream armed police. The attacks prompted the FBI to issue a warning regarding swatting attacks…
-
"NATO Tests AI’s Ability to Protect Critical Infrastructure Against Cyberattacks"During an international experiment on AI's ability to secure and defend systems, power grids, and other critical assets by cyber experts at the North Atlantic Treaty Organization's (NATO) Cyber Coalition 2022 event late last year, researchers found that…
-
"Identifying a Vulnerability in Critical Spacecraft Networks"When two spacecrafts have to bridge a connection in orbit, they dock, which means that the onboard computers controlling their thrusters require an unimpeded connection that cannot be interrupted for even a split second. Movement instructions must be…
-
"Hackers Use Windows Error Reporting Tool to Attack Devices"Hackers are compromising systems by abusing the Windows Problem Reporting tool. Using a Dynamic Link Library (DLL) sideloading method, the attackers exploit WerFault.exe to load malware into the Random Access Memory (RAM) of a compromised system. The…