Trojanized jQuery Packages Found on npm, GitHub, and jsDelivr Code Repositories

09/07/2024 0 Comments 0 tags

Unknown threat actors have been found propagating trojanized versions of jQuery on npm, GitHub, and jsDelivr in what appears to be an instance of a “complex and persistent” supply chain

Critical Unpatched Flaws Disclosed in Popular Gogs Open-Source Git Service

08/07/2024 0 Comments 0 tags

Four unpatched security flaws, including three critical ones, have been disclosed in the Gogs open-source, self-hosted Git service that could enable an authenticated attacker to breach susceptible instances, steal or

Experts Warn of Mekotio Banking Trojan Targeting Latin American Countries

08/07/2024 0 Comments 0 tags

Financial institutions in Latin America are being threatened by a banking trojan called Mekotio (aka Melcoz). That’s according to findings from Trend Micro, which said it recently observed a surge

5 Key Questions CISOs Must Ask Themselves About Their Cybersecurity Strategy

08/07/2024 0 Comments 0 tags

Events like the recent massive CDK ransomware attack – which shuttered car dealerships across the U.S. in late June 2024 – barely raise public eyebrows anymore.  Yet businesses, and the

New Ransomware-as-a-Service ‘Eldorado’ Targets Windows and Linux Systems

08/07/2024 0 Comments 0 tags

An emerging ransomware-as-a-service (RaaS) operation called Eldorado comes with locker variants to encrypt files on Windows and Linux systems. Eldorado first appeared on March 16, 2024, when an advertisement for

Dark Web Malware Logs Expose 3,300 Users Linked to Child Abuse Sites

08/07/2024 0 Comments 0 tags

An analysis of information-stealing malware logs published on the dark web has led to the discovery of thousands of consumers of child sexual abuse material (CSAM), indicating how such information

New APT Group “CloudSorcerer” Targets Russian Government Entities

08/07/2024 0 Comments 0 tags

A previously undocumented advanced persistent threat (APT) group dubbed CloudSorcerer has been observed targeting Russian government entities by leveraging cloud services for command-and-control (C2) and data exfiltration. Cybersecurity firm Kaspersky,

Apple Removes VPN Apps from Russian App Store Amid Government Pressure

08/07/2024 0 Comments 0 tags

Apple removed a number of virtual private network (VPN) apps in Russia from its App Store on July 4, 2024, following a request by Russia’s state communications watchdog Roskomnadzor, Russian

OVHcloud Hit with Record 840 Million PPS DDoS Attack Using MikroTik Routers

05/07/2024 0 Comments 0 tags

French cloud computing firm OVHcloud said it mitigated a record-breaking distributed denial-of-service (DDoS) attack in April 2024 that reached a packet rate of 840 million packets per second (Mpps). This

Webinar Alert: Learn How ITDR Solutions Stop Sophisticated Identity Attacks

05/07/2024 0 Comments 0 tags

Identity theft isn’t just about stolen credit cards anymore. Today, cybercriminals are using advanced tactics to infiltrate organizations and cause major damage with compromised credentials. The stakes are high: ransomware