CISA Urges Agencies to Patch Critical “Array Networks” Flaw Amid Active Attacks

26/11/2024 0 Comments 0 tags

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added a now-patched critical security flaw impacting Array Networks AG and vxAG secure access gateways to its Known Exploited Vulnerabilities

PyPI Python Library “aiocpa” Found Exfiltrating Crypto Keys via Telegram Bot

25/11/2024 0 Comments 0 tags

The administrators of the Python Package Index (PyPI) repository have quarantined the package “aiocpa” following a new update that included malicious code to exfiltrate private keys via Telegram. The package

Google’s New Restore Credentials Tool Simplifies App Login After Android Migration

25/11/2024 0 Comments 0 tags

Google has introduced a new feature called Restore Credentials to help users restore their account access to third-party apps securely after migrating to a new Android device. Part of Android’s

Cybersecurity Blind Spots in IaC and PaC Tools Expose Cloud Platforms to New Attacks

25/11/2024 0 Comments 0 tags

Cybersecurity researchers have disclosed two new attack techniques against infrastructure-as-code (IaC) and policy-as-code (PaC) tools like HashiCorp’s Terraform and Open Policy Agent (OPA) that leverage dedicated, domain-specific languages (DSLs) to

Flying Under the Radar – Security Evasion Techniques

25/11/2024 0 Comments 0 tags

Dive into the evolution of phishing and malware evasion techniques and understand how attackers are using increasingly sophisticated methods to bypass security measures. The Evolution of Phishing Attacks “I really

THN Recap: Top Cybersecurity Threats, Tools, and Practices (Nov 18 – Nov 24)

25/11/2024 0 Comments 0 tags

We hear terms like “state-sponsored attacks” and “critical vulnerabilities” all the time, but what’s really going on behind those words? This week’s cybersecurity news isn’t just about hackers and headlines—it’s

Researchers Uncover Malware Using BYOVD to Bypass Antivirus Protections

25/11/2024 0 Comments 0 tags

Cybersecurity researchers have uncovered a new malicious campaign that leverages a technique called Bring Your Own Vulnerable Driver (BYOVD) to disarm security protections and ultimately gain access to the infected

North Korean Hackers Steal $10M with AI-Driven Scams and Malware on LinkedIn

23/11/2024 0 Comments 0 tags

The North Korea-linked threat actor known as Sapphire Sleet is estimated to have stolen more than $10 million worth of cryptocurrency as part of social engineering campaigns orchestrated over a

Google Exposes GLASSBRIDGE: A Pro-China Influence Network of Fake News Sites

23/11/2024 0 Comments 0 tags

Government agencies and non-governmental organizations in the United States have become the target of a nascent China state threat actor known as Storm-2077. The adversary, believed to be active since

China-Linked TAG-112 Targets Tibetan Media with Cobalt Strike Espionage Campaign

22/11/2024 0 Comments 0 tags

A China-linked nation-state group called TAG-112 compromised Tibetan media and university websites in a new cyber espionage campaign designed to facilitate the delivery of the Cobalt Strike post-exploitation toolkit for