APT28 Hacker Group Targeting Europe, Americas, Asia in Widespread Phishing Scheme

18/03/2024 0 Comments 0 tags

The Russia-linked threat actor known as APT28 has been linked to multiple ongoing phishing campaigns that employ lure documents imitating government and non-governmental organizations (NGOs) in Europe, the South Caucasus, Central Asia,

Hackers Using Cracked Software on GitHub to Spread RisePro Info Stealer

16/03/2024 0 Comments 0 tags

Cybersecurity researchers have found a number of GitHub repositories offering cracked software that are used to deliver an information stealer called RisePro. The campaign, codenamed gitgub, includes 17 repositories associated with

GhostRace – New Data Leak Vulnerability Affects Modern CPUs

15/03/2024 0 Comments 0 tags

A group of researchers has discovered a new data leakage attack impacting modern CPU architectures supporting speculative execution. Dubbed GhostRace (CVE-2024-2193), it is a variation of the transient execution CPU vulnerability known

Google Introduces Enhanced Real-Time URL Protection for Chrome Users

15/03/2024 0 Comments 0 tags

Google on Thursday announced an enhanced version of Safe Browsing to provide real-time, privacy-preserving URL protection and safeguard users from visiting potentially malicious sites. “The Standard protection mode for Chrome on desktop

Third-Party ChatGPT Plugins Could Lead to Account Takeovers

15/03/2024 0 Comments 0 tags

Cybersecurity researchers have found that third-party plugins available for OpenAI ChatGPT could act as a new attack surface for threat actors looking to gain unauthorized access to sensitive data. According

Malicious Ads Targeting Chinese Users with Fake Notepad++ and VNote Installers

15/03/2024 0 Comments 0 tags

Chinese users looking for legitimate software such as Notepad++ and VNote on search engines like Baidu are being targeted with malicious ads and bogus links to distribute trojanized versions of

Researchers Detail Kubernetes Vulnerability That Enables Windows Node Takeover

14/03/2024 0 Comments 0 tags

Details have been made public about a now-patched high-severity flaw in Kubernetes that could allow a malicious attacker to achieve remote code execution with elevated privileges under specific circumstances. “The

LockBit Ransomware Hacker Ordered to Pay $860,000 After Guilty Plea in Canada

14/03/2024 0 Comments 0 tags

A 34-year-old Russian-Canadian national has been sentenced to nearly four years in jail in Canada for his participation in the LockBit global ransomware operation. Mikhail Vasiliev, an Ontario resident, was originally

RedCurl Cybercrime Group Abuses Windows PCA Tool for Corporate Espionage

14/03/2024 0 Comments 0 tags

The Russian-speaking cybercrime group called RedCurl is leveraging a legitimate Microsoft Windows component called the Program Compatibility Assistant (PCA) to execute malicious commands. “The Program Compatibility Assistant Service (pcalua.exe) is a Windows

3 Things CISOs Achieve with Cato

14/03/2024 0 Comments 0 tags

Being a CISO is a balancing act: ensuring organizations are secure without compromising users’ productivity. This requires taking multiple elements into consideration, like cost, complexity, performance and user experience. CISOs