Lazarus Hacker Group Evolves Tactics, Tools, and Targets in DeathNote Campaign

13/04/2023 0 Comments 0 tags

The North Korean threat actor known as the Lazarus Group has been observed shifting its focus and rapidly evolving its tools and tactics as part of a long-running activity called DeathNote.

ChatGPT Security: OpenAI’s Bug Bounty Program Offers Up to $20,000 Prizes

13/04/2023 0 Comments 0 tags

OpenAI, the company behind the massively popular ChatGPT AI chatbot, has launched a bug bounty program in an attempt to ensure its systems are “safe and secure.” To that end, it has

Israel-based Spyware Firm QuaDream Targets High-Risk iPhones with Zero-Click Exploit

12/04/2023 0 Comments 0 tags

Threat actors using hacking tools from an Israeli surveillanceware vendor named QuaDream targeted at least five members of civil society in North America, Central Asia, Southeast Asia, Europe, and the

The Service Accounts Challenge: Can’t See or Secure Them Until It’s Too Late

12/04/2023 0 Comments 0 tags

Here’s a hard question to answer: ‘How many service accounts do you have in your environment?’. A harder one is: ‘Do you know what these accounts are doing?’. And the

Urgent: Microsoft Issues Patches for 97 Flaws, Including Active Ransomware Exploit

12/04/2023 0 Comments 0 tags

It’s the second Tuesday of the month, and Microsoft has released another set of security updates to fix a total of 97 flaws impacting its software, one of which has been actively

North Korean Hackers Uncovered as Mastermind in 3CX Supply Chain Attack

12/04/2023 0 Comments 0 tags

Enterprise communications service provider 3CX confirmed that the supply chain attack targeting its desktop application for Windows and macOS was the handiwork of a threat actor with North Korean nexus. The findings

Newly Discovered “By-Design” Flaw in Microsoft Azure Could Expose Storage Accounts to Hackers

11/04/2023 0 Comments 0 tags

A “by-design flaw” uncovered in Microsoft Azure could be exploited by attackers to gain access to storage accounts, move laterally in the environment, and even execute remote code. “It is

Cybercriminals Turn to Android Loaders on Dark Web to Evade Google Play Security

11/04/2023 0 Comments 0 tags

Malicious loader programs capable of trojanizing Android applications are being traded on the criminal underground for up to $20,000 as a way to evade Google Play Store defenses. “The most

[eBook] A Step-by-Step Guide to Cyber Risk Assessment

11/04/2023 0 Comments 0 tags

In today’s perilous cyber risk landscape, CISOs and CIOs must defend their organizations against relentless cyber threats, including ransomware, phishing, attacks on infrastructure, supply chain breaches, malicious insiders, and much

Cryptocurrency Stealer Malware Distributed via 13 NuGet Packages

11/04/2023 0 Comments 0 tags

Cybersecurity researchers have detailed the inner workings of the cryptocurrency stealer malware that was distributed via 13 malicious NuGet packages as part of a supply chain attack targeting .NET developers.