CosmicBeetle Deploys Custom ScRansom Ransomware, Partnering with RansomHub

10/09/2024 0 Comments 0 tags

The threat actor known as CosmicBeetle has debuted a new custom ransomware strain called ScRansom in attacks targeting small- and medium-sized businesses (SMBs) in Europe, Asia, Africa, and South America,

Experts Identify 3 Chinese-Linked Clusters Behind Cyberattacks in Southeast Asia

10/09/2024 0 Comments 0 tags

A trio of threat activity clusters linked to China has been observed compromising more government organizations in Southeast Asia as part of a renewed state-sponsored operation codenamed Crimson Palace, indicating

Shining a Light on Shadow Apps: The Invisible Gateway to SaaS Data Breaches

10/09/2024 0 Comments 0 tags

Shadow apps, a segment of Shadow IT, are SaaS applications purchased without the knowledge of the security team. While these applications may be legitimate, they operate within the blind spots

New PIXHELL Attack Exploits Screen Noise to Exfiltrates Data from Air-Gapped Computers

10/09/2024 0 Comments 0 tags

A new side-channel attack dubbed PIXHELL could be abused to target air-gapped computers by breaching the “audio gap” and exfiltrating sensitive information by taking advantage of the noise generated by

Mustang Panda Deploys Advanced Malware to Spy on Asia-Pacific Governments

10/09/2024 0 Comments 0 tags

The threat actor tracked as Mustang Panda has refined its malware arsenal to include new tools in order to facilitate data exfiltration and the deployment of next-stage payloads, according to

New RAMBO Attack Uses RAM Radio Signals to Steal Data from Air-Gapped Networks

09/09/2024 0 Comments 0 tags

A novel side-channel attack has been found to leverage radio signals emanated by a device’s random access memory (RAM) as a data exfiltration mechanism, posing a threat to air-gapped networks.

One More Tool Will Do It? Reflecting on the CrowdStrike Fallout

09/09/2024 0 Comments 0 tags

The proliferation of cybersecurity tools has created an illusion of security. Organizations often believe that by deploying a firewall, antivirus software, intrusion detection systems, identity threat detection and response, and

Blind Eagle Targets Colombian Insurance Sector with Customized Quasar RAT

09/09/2024 0 Comments 0 tags

The Colombian insurance sector is the target of a threat actor tracked as Blind Eagle with the end goal of delivering a customized version of a known commodity remote access

Chinese Hackers Exploit Visual Studio Code in Southeast Asian Cyberattacks

09/09/2024 0 Comments 0 tags

The China-linked advanced persistent threat (APT) group known as Mustang Panda has been observed weaponizing Visual Studio Code software as part of espionage operations targeting government entities in Southeast Asia.

Webinar: How to Protect Your Company from GenAI Data Leakage Without Losing It’s Productivity Benefits

09/09/2024 0 Comments 0 tags

GenAI has become a table stakes tool for employees, due to the productivity gains and innovative capabilities it offers. Developers use it to write code, finance teams use it to