Hackers Target Python Developers with Fake “Crytic-Compilers” Package on PyPI

06/06/2024 0 Comments 0 tags

Cybersecurity researchers have discovered a malicious Python package uploaded to the Python Package Index (PyPI) repository that’s designed to deliver an information stealer called Lumma (aka LummaC2). The package in

Celebrity TikTok Accounts Compromised Using Zero-Click Attack via DMs

05/06/2024 0 Comments 0 tags

Popular video-sharing platform TikTok has acknowledged a security issue that has been exploited by threat actors to take control of high-profile accounts on the platform. The development was first reported

Rebranded Knight Ransomware Targeting Healthcare and Businesses Worldwide

05/06/2024 0 Comments 0 tags

An analysis of a nascent ransomware strain called RansomHub has revealed it to be an updated and rebranded version of Knight ransomware, itself an evolution of another ransomware known as

Zyxel Releases Patches for Firmware Vulnerabilities in EoL NAS Models

05/06/2024 0 Comments 0 tags

Zyxel has released security updates to address critical flaws impacting two of its network-attached storage (NAS) devices that have currently reached end-of-life (EoL) status. Successful exploitation of three of the

Chinese State-Backed Cyber Espionage Targets Southeast Asian Government

05/06/2024 0 Comments 0 tags

An unnamed high-profile government organization in Southeast Asia emerged as the target of a “complex, long-running” Chinese state-sponsored cyber espionage operation codenamed Crimson Palace. “The overall goal behind the campaign

Unpacking 2024’s SaaS Threat Predictions

05/06/2024 0 Comments 0 tags

Early in 2024, Wing Security released its State of SaaS Security report, offering surprising insights into emerging threats and best practices in the SaaS domain. Now, halfway through the year,

Russian Power Companies, IT Firms, and Govt Agencies Hit by Decoy Dog Trojan

04/06/2024 0 Comments 0 tags

Russian organizations are at the receiving end of cyber attacks that have been found to deliver a Windows version of a malware called Decoy Dog. Cybersecurity company Positive Technologies is

Telerik Report Server Flaw Could Let Attackers Create Rogue Admin Accounts

04/06/2024 0 Comments 0 tags

Progress Software has rolled out updates to address a critical security flaw impacting the Telerik Report Server that could be potentially exploited by a remote attacker to bypass authentication and

The Next Generation of RBI (Remote Browser Isolation)

04/06/2024 0 Comments 0 tags

The landscape of browser security has undergone significant changes over the past decade. While Browser Isolation was once considered the gold standard for protecting against browser exploits and malware downloads,

Hackers Use MS Excel Macro to Launch Multi-Stage Malware Attack in Ukraine

04/06/2024 0 Comments 0 tags

A new sophisticated cyber attack has been observed targeting endpoints geolocated to Ukraine with an aim to deploy Cobalt Strike and seize control of the compromised hosts. The attack chain,