10-Year-Old ‘RUBYCARP’ Romanian Hacker Group Surfaces with Botnet

09/04/2024 0 Comments 0 tags

A threat group of suspected Romanian origin called RUBYCARP has been observed maintaining a long-running botnet for carrying out crypto mining, distributed denial-of-service (DDoS), and phishing attacks. The group, believed to be

Hackers Targeting Human Rights Activists in Morocco and Western Sahara

09/04/2024 0 Comments 0 tags

Human rights activists in Morocco and the Western Sahara region are the targets of a new threat actor that leverages phishing attacks to trick victims into installing bogus Android apps

Researchers Discover LG Smart TV Vulnerabilities Allowing Root Access

09/04/2024 0 Comments 0 tags

Multiple security vulnerabilities have been disclosed in LG webOS running on its smart televisions that could be exploited to bypass authorization and gain root access on the devices. The findings

CL0P’s Ransomware Rampage – Security Measures for 2024

09/04/2024 0 Comments 0 tags

2023 CL0P Growth  Emerging in early 2019, CL0P was first introduced as a more advanced version of its predecessor the ‘CryptoMix’ ransomware, brought about by its owner CL0P ransomware, a

Attackers Using Obfuscation Tools to Deliver Multi-Stage Malware via Invoice Phishing

09/04/2024 0 Comments 0 tags

Cybersecurity researchers have discovered an intricate multi-stage attack that leverages invoice-themed phishing decoys to deliver a wide range of malware such as Venom RAT, Remcos RAT, XWorm, NanoCore RAT, and a

Critical Flaws Leave 92,000 D-Link NAS Devices Vulnerable to Malware Attacks

09/04/2024 0 Comments 0 tags

Threat actors are actively scanning and exploiting a pair of security flaws that are said to affect as many as 92,000 internet-exposed D-Link network-attached storage (NAS) devices. Tracked as CVE-2024-3272 (CVSS score:

Embracing the Cloud: Revolutionizing Privileged Access Management with One Identity Cloud PAM Essentials

09/04/2024 0 Comments 0 tags

As cyber threats loom around every corner and privileged accounts become prime targets, the significance of implementing a robust Privileged Access Management (PAM) solution can’t be overstated. With organizations increasingly migrating to

Google Chrome Adds V8 Sandbox – A New Defense Against Browser Attacks

08/04/2024 0 Comments 0 tags

Google has announced support for what’s called a V8 Sandbox in the Chrome web browser in an effort to address memory corruption issues. The sandbox, according to V8 Security technical lead Samuel

Watch Out for ‘Latrodectus’ – This Malware Could Be In Your Inbox

08/04/2024 0 Comments 0 tags

Threat hunters have discovered a new malware called Latrodectus that has been distributed as part of email phishing campaigns since at least late November 2023. “Latrodectus is an up-and-coming downloader with various

The Drop in Ransomware Attacks in 2024 and What it Means

08/04/2024 0 Comments 0 tags

The ransomware industry surged in 2023 as it saw an alarming 55.5% increase in victims worldwide, reaching a staggering 5,070. But 2024 is starting off showing a very different picture. While the numbers skyrocketed