Mysterious Cyber Attack Took Down 600,000+ Routers in the U.S.

31/05/2024 0 Comments 0 tags

More than 600,000 small office/home office (SOHO) routers are estimated to have been bricked and taken offline following a destructive cyber attack staged by unidentified cyber actors, disrupting users’ access

Microsoft Warns of Surge in Cyber Attacks Targeting Internet-Exposed OT Devices

31/05/2024 0 Comments 0 tags

Microsoft has emphasized the need for securing internet-exposed operational technology (OT) devices following a spate of cyber attacks targeting such environments since late 2023. “These repeated attacks against OT devices

Beyond Threat Detection – A Race to Digital Security

31/05/2024 0 Comments 0 tags

Digital content is a double-edged sword, providing vast benefits while simultaneously posing significant threats to organizations across the globe. The sharing of digital content has increased significantly in recent years,

Russian Hackers Target Europe with HeadLace Malware and Credential Harvesting

31/05/2024 0 Comments 0 tags

The Russian GRU-backed threat actor APT28 has been attributed as behind a series of campaigns targeting networks across Europe with the HeadLace malware and credential-harvesting web pages. APT28, also known

OpenAI, Meta, TikTok Disrupt Multiple AI-Powered Disinformation Campaigns

31/05/2024 0 Comments 0 tags

OpenAI on Thursday disclosed that it took steps to cut off five covert influence operations (IO) originating from China, Iran, Israel, and Russia that sought to abuse its artificial intelligence

FlyingYeti Exploits WinRAR Vulnerability to Deliver COOKBOX Malware in Ukraine

30/05/2024 0 Comments 0 tags

Cloudflare on Thursday said it took steps to disrupt a month-long phishing campaign orchestrated by a Russia-aligned threat actor called FlyingYeti targeting Ukraine. “The FlyingYeti campaign capitalized on anxiety over

CISA Alerts Federal Agencies to Patch Actively Exploited Linux Kernel Flaw

30/05/2024 0 Comments 0 tags

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday added a security flaw impacting the Linux kernel to the Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation.

RedTail Crypto-Mining Malware Exploiting Palo Alto Networks Firewall Vulnerability

30/05/2024 0 Comments 0 tags

The threat actors behind the RedTail cryptocurrency mining malware have added a recently disclosed security flaw impacting Palo Alto Networks firewalls to its exploit arsenal. The addition of the PAN-OS

Cyber Espionage Alert: LilacSquid Targets IT, Energy, and Pharma Sectors

30/05/2024 0 Comments 0 tags

A previously undocumented cyber espionage-focused threat actor named LilacSquid has been linked to targeted attacks spanning various sectors in the United States (U.S.), Europe, and Asia as part of a

Researchers Uncover Active Exploitation of WordPress Plugin Vulnerabilities

30/05/2024 0 Comments 0 tags

Cybersecurity researchers have warned that multiple high-severity security vulnerabilities in WordPress plugins are being actively exploited by threat actors to create rogue administrator accounts for follow-on exploitation. “These vulnerabilities are