Defending against USB drive attacks with Wazuh

05/03/2025 0 Comments 0 tags

USB drive attacks constitute a significant cybersecurity risk, taking advantage of the everyday use of USB devices to deliver malware and circumvent traditional network security measures. These attacks lead to

Dark Caracal Uses Poco RAT to Target Spanish-Speaking Enterprises in Latin America

05/03/2025 0 Comments 0 tags

The threat actor known as Dark Caracal has been attributed to a campaign that deployed a remote access trojan called Poco RAT in attacks targeting Spanish-speaking targets in Latin America

Google Rolls Out AI Scam Detection for Android to Combat Conversational Fraud

05/03/2025 0 Comments 0 tags

Google has announced the rollout of artificial intelligence (AI)-powered scam detection features to secure Android device users and their personal information. “These features specifically target conversational scams, which can often

Identity: The New Cybersecurity Battleground

05/03/2025 0 Comments 0 tags

The rapid adoption of cloud services, SaaS applications, and the shift to remote work have fundamentally reshaped how enterprises operate. These technological advances have created a world of opportunity but

Chinese APT Lotus Panda Targets Governments With New Sagerunex Backdoor Variants

05/03/2025 0 Comments 0 tags

The threat actor known as Lotus Panda has been observed targeting government, manufacturing, telecommunications, and media sectors in the Philippines, Vietnam, Hong Kong, and Taiwan with updated versions of a

Seven Malicious Go Packages Found Deploying Malware on Linux and macOS Systems

05/03/2025 0 Comments 0 tags

Cybersecurity researchers are alerting of an ongoing malicious campaign targeting the Go ecosystem with typosquatted modules that are designed to deploy loader malware on Linux and Apple macOS systems. “The

Researchers Link CACTUS Ransomware Tactics to Former Black Basta Affiliates

04/03/2025 0 Comments 0 tags

Threat actors deploying the Black Basta and CACTUS ransomware families have been found to rely on the same BackConnect (BC) module for maintaining persistent control over infected hosts, a sign

VMware Security Flaws Exploited in the Wild—Broadcom Releases Urgent Patches

04/03/2025 0 Comments 0 tags

Broadcom has released security updates to address three actively exploited security flaws in VMware ESXi, Workstation, and Fusion products that could lead to code execution and information disclosure. The list

How New AI Agents Will Transform Credential Stuffing Attacks

04/03/2025 0 Comments 0 tags

Credential stuffing attacks had a huge impact in 2024, fueled by a vicious circle of infostealer infections and data breaches. But things could be about to get worse still with

Suspected Iranian Hackers Used Compromised Indian Firm’s Email to Target U.A.E. Aviation Sector

04/03/2025 0 Comments 0 tags

Threat hunters are calling attention to a new highly-targeted phishing campaign that singled out “fewer than five” entities in the United Arab Emirates (U.A.E.) to deliver a previously undocumented Golang