SpectralBlur: New macOS Backdoor Threat from North Korean Hackers

05/01/2024 0 Comments 0 tags

Cybersecurity researchers have discovered a new Apple macOS backdoor called SpectralBlur that overlaps with a known malware family that has been attributed to North Korean threat actors. “SpectralBlur is a moderately capable

Orange Spain Faces BGP Traffic Hijack After RIPE Account Hacked by Malware

05/01/2024 0 Comments 0 tags

Mobile network operator Orange Spain suffered an internet outage for several hours on January 3 after a threat actor used administrator credentials captured by means of stealer malware to hijack

Exposed Secrets are Everywhere. Here’s How to Tackle Them

05/01/2024 0 Comments 0 tags

Picture this: you stumble upon a concealed secret within your company’s source code. Instantly, a wave of panic hits as you grasp the possible consequences. This one hidden secret has

Russian Hackers Had Covert Access to Ukraine’s Telecom Giant for Months

05/01/2024 0 Comments 0 tags

Ukrainian cybersecurity authorities have disclosed that the Russian state-sponsored threat actor known as Sandworm was inside telecom operator Kyivstar’s systems at least since May 2023. The development was first reported by Reuters. The incident, described

Alert: Ivanti Releases Patch for Critical Vulnerability in Endpoint Manager Solution

05/01/2024 0 Comments 0 tags

Ivanti has released security updates to address a critical flaw impacting its Endpoint Manager (EPM) solution that, if successfully exploited, could result in remote code execution (RCE) on susceptible servers.

New Bandook RAT Variant Resurfaces, Targeting Windows Machines

05/01/2024 0 Comments 0 tags

A new variant of remote access trojan called Bandook has been observed being propagated via phishing attacks with an aim to infiltrate Windows machines, underscoring the continuous evolution of the malware. Fortinet

Three Ways To Supercharge Your Software Supply Chain Security

04/01/2024 0 Comments 0 tags

Section four of the “Executive Order on Improving the Nation’s Cybersecurity” introduced a lot of people in tech to the concept of a “Software Supply Chain” and securing it. If

UAC-0050 Group Using New Phishing Tactics to Distribute Remcos RAT

04/01/2024 0 Comments 0 tags

The threat actor known as UAC-0050 is leveraging phishing attacks to distribute Remcos RAT using new strategies to evade detection from security software. “The group’s weapon of choice is Remcos

Beware: 3 Malicious PyPI Packages Found Targeting Linux with Crypto Miners

04/01/2024 0 Comments 0 tags

Three new malicious packages have been discovered in the Python Package Index (PyPI) open-source repository with capabilities to deploy a cryptocurrency miner on affected Linux devices. The three harmful packages,

Mandiant’s Twitter Account Restored After Six-Hour Crypto Scam Hack

04/01/2024 0 Comments 0 tags

American cybersecurity firm and Google Cloud subsidiary Mandiant had its X (formerly Twitter) account compromised for more than six hours by an unknown attacker to propagate a cryptocurrency scam. As