February 28, 2024
Via: Security AffairsIn the ever-shifting digital arena, staying ahead of evolving threat trends is paramount for organizations aiming to safeguard their assets. Amidst this dynamic landscape, email stands as a primary battleground for cyber defense. VIPRE Security Group’s latest report, “Email Security […]
Application security, Security
February 20, 2024
Via: SecureWorldOpenAI and Microsoft recently collaborated to identify and disrupt several nation-state actors who were attempting to use AI services for malicious cyber activities. According to Microsoft, the disrupted threat actors were affiliated with China, Iran, North Korea, and Russia. Their […]
Threats & Malware, Virus & Malware
February 9, 2024
Via: The RegisterAs artificial intelligence (AI) technology becomes increasingly complex so do the threats from bad actors. It is like a forever war. Half the time too, we barely know that we’re using AI, largely because it’s getting progressively cheaper and easier […]
February 7, 2024
Via: SecureWorldThe U.S. State Department announced Monday a new policy to impose visa restrictions on individuals linked to the misuse of commercial spyware tools that enable unlawful surveillance and human rights abuses globally. “The misuse of commercial spyware threatens privacy and […]
February 5, 2024
Via: SecurityWeekA United States federal judge has sentenced Joshua Adam Schulte, a former CIA employee, to 40 years in prison for one of the largest disclosures of classified information in U.S. history. Schulte worked as a software developer for the CIA’s […]
December 13, 2023
Via: The RegisterIn China, clouds are a symbol of luck. See multiple layering of clouds in a blue sky can mean you are in line to receive eternal happiness. If only that was true in the complex world of IT, where multi-cloud […]
November 6, 2023
Via: The RegisterOrganisations in multiple industries often face risks which can severely impact their operational resilience. Cyber criminals like to use ransomware and vulnerable third-party connections to hijack operational technology (OT) systems which can stop production in manufacturing environments, for example. These […]
Threats & Malware, Vulnerabilities
November 2, 2023
Via: SecureWorldIn the ever-evolving landscape of cybersecurity threats, the discovery of serious vulnerabilities can send shockwaves through the digital world. One such recent incident that has captured the attention of security professionals is the exploitation of a critical vulnerability known as […]
October 20, 2023
Via: Help Net SecurityThe financial constraints many smaller organizations face often cast shadows on their ability to fortify defenses. In this Help Net Security interview, Brent Deterding, CISO at Afni, delves into the realities and myths surrounding the cybersecurity poverty line, exploring the […]
October 3, 2023
Via: Security AffairsZscaler ThreatLabz researchers discovered a new malware-as-a-service (MaaS) that is called BunnyLoader, which has been advertised for sale in multiple cybercrime forums since September 4, 2023. The BunnyLoader malware loader is written in C/C++ and is sold on various forums […]
Threats & Malware, Vulnerabilities
August 23, 2023
Via: Dark ReadingThe US Department of Defense (DoD) will create an insider threat office to monitor employees following a review into the leak of classified Pentagon intelligence on Discord. A June 30 memo signed by the Secretary of Defense calls for the […]
Threats & Malware, Vulnerabilities
June 29, 2023
Via: SecureWorldThe cybersecurity landscape is reeling from the aftermath of a widespread attack caused by a vulnerability in the popular file transfer tool, MOVEit Transfer. Hackers have taken advantage of this security flaw, launching a series of attacks that have impacted […]
Application security, Security
May 4, 2023
Via: The Hacker NewsIT and cybersecurity teams are so inundated with security notifications and alerts within their own systems, it’s difficult to monitor external malicious environments – which only makes them that much more threatening. In March, a high-profile data breach hit national […]
Threats & Malware, Virus & Malware
May 2, 2023
Via: The Hacker NewsThe North Korean threat actor known as ScarCruft started experimenting with oversized LNK files as a delivery route for RokRAT malware as early as July 2022, the same month Microsoft began blocking macros across Office documents by default. “RokRAT has […]
Threats & Malware, Virus & Malware
April 27, 2023
Via: The Hacker NewsRemote Access Trojans (RATs) have taken the third leading position in ANY. RUN’s Q1 2023 report on the most prevalent malware types, making it highly probable that your organization may face this threat. Though LimeRAT might not be the most […]
April 13, 2023
Via: Dark ReadingWhile an increasingly number of regulations have made the reporting of data breaches mandatory, a majority of IT professionals in the United States say they have been told to keep quiet about an incident, potentially running afoul of legal requirements. […]
Threats & Malware, Virus & Malware
April 11, 2023
Via: Dark ReadingResearchers have discovered malware peddlers advertising an info-stealer out in the open on the Python Package Index (PyPI) — the official, public repository for the Python programming language — with only the thinnest veneer of obfuscation. The perpetrators — whom […]
September 26, 2022
Via: The Hacker NewsCybersecurity today matters so much because of everyone’s dependence on technology, from collaboration, communication and collecting data to e-commerce and entertainment. Every organisation that needs to deliver services to their customers and employees must protect their IT ‘network’ – all […]
August 22, 2022
Via: Help Net SecurityResecurity, a Los Angeles-based cybersecurity company protecting Fortune 500 worldwide, identified a new RAT (Remote Administration Tool) advertised in Dark Web and Telegram called Escanor. The threat actors offer Android-based and PC-based versions of RAT, along with HVNC module and […]
Threats & Malware, Virus & Malware
August 18, 2022
Via: Security WeekLikely active since 2015, DarkTortilla was designed to keep malicious payloads hidden from detection software, and was previously seen delivering remote access trojans (RATs) and information stealers – AgentTesla, AsyncRat, NanoCore, and RedLine – as well as targeted payloads such […]