Dormant PyPI Package Compromised to Spread Nova Sentinel Malware

23/02/2024 0 Comments 0 tags

A dormant package available on the Python Package Index (PyPI) repository was updated nearly after two years to propagate an information stealer malware called Nova Sentinel. The package, named django-log-tracker, was

Microsoft Releases PyRIT – A Red Teaming Tool for Generative AI

23/02/2024 0 Comments 0 tags

Microsoft has released an open access automation framework called PyRIT (short for Python Risk Identification Tool) to proactively identify risks in generative artificial intelligence (AI) systems. The red teaming tool is designed

How to Use Tines’s SOC Automation Capability Matrix

23/02/2024 0 Comments 0 tags

Created by John Tuckner and the team at workflow and automation platform Tines, the SOC Automation Capability Matrix (SOC ACM) is a set of techniques designed to help security operations teams understand their

Researchers Detail Apple’s Recent Zero-Click Shortcuts Vulnerability

23/02/2024 0 Comments 0 tags

Details have emerged about a now-patched high-severity security flaw in Apple’s Shortcuts app that could permit a shortcut to access sensitive information on the device without users’ consent. The vulnerability,

FTC Slams Avast with $16.5 Million Fine for Selling Users’ Browsing Data

23/02/2024 0 Comments 0 tags

The U.S. Federal Trade Commission (FTC) has hit antivirus vendor Avast with a $16.5 million fine over charges that the firm sold users’ browsing data to advertisers after claiming its

Apple Unveils PQ3 Protocol – Post-Quantum Encryption for iMessage

23/02/2024 0 Comments 0 tags

Apple has announced a new post-quantum cryptographic protocol called PQ3 that it said will be integrated into iMessage to secure the messaging platform against future attacks arising from the threat of a

U.S. Offers $15 Million Bounty to Hunt Down LockBit Ransomware Leaders

22/02/2024 0 Comments 0 tags

The U.S. State Department has announced monetary rewards of up to $15 million for information that could lead to the identification of key leaders within the LockBit ransomware group and

Cybercriminals Weaponizing Open-Source SSH-Snake Tool for Network Attacks

22/02/2024 0 Comments 0 tags

A recently open-sourced network mapping tool called SSH-Snake has been repurposed by threat actors to conduct malicious activities. “SSH-Snake is a self-modifying worm that leverages SSH credentials discovered on a compromised system

A New Age of Hacktivism

22/02/2024 0 Comments 0 tags

In the past 2 years, we have observed a significant surge in hacktivism activity due to ongoing wars and geopolitical conflicts in various regions. Since the war against Ukraine began,

Russian Government Software Backdoored to Deploy Konni RAT Malware

22/02/2024 0 Comments 0 tags

An installer for a tool likely used by the Russian Consular Department of the Ministry of Foreign Affairs (MID) has been backdoored to deliver a remote access trojan called Konni RAT (aka UpDog).