Malware Campaign Uses Ethereum Smart Contracts to Control npm Typosquat Packages

05/11/2024 0 Comments 0 tags

An ongoing campaign is targeting npm developers with hundreds of typosquat versions of their legitimate counterparts in an attempt to trick them into running cross-platform malware. The attack is notable

Google Warns of Actively Exploited CVE-2024-43093 Vulnerability in Android System

05/11/2024 0 Comments 0 tags

Google has warned that a security flaw impacting its Android operating system has come under active exploitation in the wild. The vulnerability, tracked as CVE-2024-43093, has been described as a

Critical Flaws in Ollama AI Framework Could Enable DoS, Model Theft, and Poisoning

04/11/2024 0 Comments 0 tags

Cybersecurity researchers have disclosed six security flaws in the Ollama artificial intelligence (AI) framework that could be exploited by a malicious actor to perform various actions, including denial-of-service, model poisoning,

German Police Disrupt DDoS-for-Hire Platform dstat[.]cc; Suspects Arrested

04/11/2024 0 Comments 0 tags

German law enforcement authorities have announced the disruption of a criminal service called dstat[.]cc that made it possible for other threat actors to easily mount distributed denial-of-service (DDoS) attacks. “The

THN Recap: Top Cybersecurity Threats, Tools, and Practices (Oct 28 – Nov 03)

04/11/2024 0 Comments 0 tags

This week was a total digital dumpster fire! Hackers were like, “Let’s cause some chaos!” and went after everything from our browsers to those fancy cameras that zoom and spin.

Cyber Threats That Could Impact the Retail Industry This Holiday Season (and What to Do About It)

04/11/2024 0 Comments 0 tags

As the holiday season approaches, retail businesses are gearing up for their annual surge in online (and in-store) traffic. Unfortunately, this increase in activity also attracts cybercriminals looking to exploit

Google’s AI Tool Big Sleep Finds Zero-Day Vulnerability in SQLite Database Engine

04/11/2024 0 Comments 0 tags

Google said it discovered a zero-day vulnerability in the SQLite open-source database engine using its large language model (LLM) assisted framework called Big Sleep (formerly Project Naptime). The tech giant

New FakeCall Malware Variant Hijacks Android Devices for Fraudulent Banking Calls

04/11/2024 0 Comments 0 tags

Cybersecurity researchers have discovered a new version of a well-known Android malware family dubbed FakeCall that employs voice phishing (aka vishing) techniques to trick users into parting with their personal

Inside Iran’s Cyber Playbook: AI, Fake Hosting, and Psychological Warfare

01/11/2024 0 Comments 0 tags

U.S. and Israeli cybersecurity agencies have published a new advisory attributing an Iranian cyber group to targeting the 2024 Summer Olympics and compromising a French commercial dynamic display provider to

Massive Git Config Breach Exposes 15,000 Credentials; 10,000 Private Repos Cloned

01/11/2024 0 Comments 0 tags

Cybersecurity researchers have flagged a “massive” campaign that targets exposed Git configurations to siphon credentials, clone private repositories, and even extract cloud credentials from the source code. The activity, codenamed