ShadowSyndicate: A New Cybercrime Group Linked to 7 Ransomware Families

26/09/2023 0 Comments 0 tags

Cybersecurity experts have shed light on a new cybercrime group known as ShadowSyndicate (formerly Infra Storm) that may have leveraged as many as seven different ransomware families over the past year. “ShadowSyndicate

Microsoft is Rolling out Support for Passkeys in Windows 11

26/09/2023 0 Comments 0 tags

Microsoft is officially rolling out support for passkeys in Windows 11 today as part of a major update to the desktop operating system. The feature allows users to login to websites and

Critical JetBrains TeamCity Flaw Could Expose Source Code and Build Pipelines to Attackers

26/09/2023 0 Comments 0 tags

A critical security vulnerability in the JetBrains TeamCity continuous integration and continuous deployment (CI/CD) software could be exploited by unauthenticated attackers to achieve remote code execution on affected systems. The

Chinese Hackers TAG-74 Targets South Korean Organizations in a Multi-Year Campaign

26/09/2023 0 Comments 0 tags

A “multi-year” Chinese state-sponsored cyber espionage campaign has been observed targeting South Korean academic, political, and government organizations. Recorded Future’s Insikt Group, which is tracking the activity under the moniker TAG-74, said

New Report Uncovers 3 Distinct Clusters of China-Nexus Attacks on Southeast Asian Government

25/09/2023 0 Comments 0 tags

An unnamed Southeast Asian government has been targeted by multiple China-nexus threat actors as part of espionage campaigns targeting the region over extended periods of time. “While this activity occurred

From Watering Hole to Spyware: EvilBamboo Targets Tibetans, Uyghurs, and Taiwanese

25/09/2023 0 Comments 0 tags

Tibetan, Uyghur, and Taiwanese individuals and organizations are the targets of a persistent campaign orchestrated by a threat actor codenamed EvilBamboo to gather sensitive information. “The attacker has created fake Tibetan websites,

Are You Willing to Pay the High Cost of Compromised Credentials?

25/09/2023 0 Comments 0 tags

Weak password policies leave organizations vulnerable to attacks. But are the standard password complexity requirements enough to secure them? 83% of compromised passwords would satisfy the password complexity and length requirements of

Webinar — AI vs. AI: Harnessing AI Defenses Against AI-Powered Risks

25/09/2023 0 Comments 0 tags

Generative AI is a double-edged sword, if there ever was one. There is broad agreement that tools like ChatGPT are unleashing waves of productivity across the business, from IT, to

Ukrainian Military Targeted in Phishing Campaign Leveraging Drone Manuals

25/09/2023 0 Comments 0 tags

Ukrainian military entities are the target of a phishing campaign that leverages drone manuals as lures to deliver a Go-based open-source post-exploitation toolkit called Merlin. “Since drones or Unmanned Aerial

New Apple Zero-Days Exploited to Target Egyptian ex-MP with Predator Spyware

24/09/2023 0 Comments 0 tags

The three zero-day flaws addressed by Apple on September 21, 2023, were leveraged as part of an iPhone exploit chain in an attempt to deliver a spyware strain called Predator targeting former Egyptian member