China Accuses U.S. of Fabricating Volt Typhoon to Hide Its Own Hacking Campaigns

15/10/2024 0 Comments 0 tags

China’s National Computer Virus Emergency Response Center (CVERC) has doubled down on claims that the threat actor known as Volt Typhoon is a fabrication of the U.S. and its allies. The

The Rise of Zero-Day Vulnerabilities: Why Traditional Security Solutions Fall Short

15/10/2024 0 Comments 0 tags

In recent years, the number and sophistication of zero-day vulnerabilities have surged, posing a critical threat to organizations of all sizes. A zero-day vulnerability is a security flaw in software

New Linux Variant of FASTCash Malware Targets Payment Switches in ATM Heists

15/10/2024 0 Comments 0 tags

North Korean threat actors have been observed using a Linux variant of a known malware family called FASTCash to steal funds as part of a financially-motivated campaign. The malware is

New Malware Campaign Uses PureCrypter Loader to Deliver DarkVision RAT

15/10/2024 0 Comments 0 tags

Cybersecurity researchers have disclosed a new malware campaign that leverages a malware loader named PureCrypter to deliver a commodity remote access trojan (RAT) called DarkVision RAT. The activity, observed by

WordPress Plugin Jetpack Patches Major Vulnerability Affecting 27 Million Sites

15/10/2024 0 Comments 0 tags

The maintainers of the Jetpack WordPress plugin have released a security update to remediate a critical vulnerability that could allow logged-in users to access forms submitted by others on a

THN Cybersecurity Recap: Top Threats, Tools and Trends (Oct 7 – Oct 13)

14/10/2024 0 Comments 0 tags

Hey there, it’s your weekly dose of “what the heck is going on in cybersecurity land” – and trust me, you NEED to be in the loop this time. We’ve

Supply Chain Attacks Can Exploit Entry Points in Python, npm, and Open-Source Ecosystems

14/10/2024 0 Comments 0 tags

Cybersecurity researchers have found that entry points could be abused across multiple programming ecosystems like PyPI, npm, Ruby Gems, NuGet, Dart Pub, and Rust Crates to stage software supply chain

5 Steps to Boost Detection and Response in a Multi-Layered Cloud

14/10/2024 0 Comments 0 tags

The link between detection and response (DR) practices and cloud security has historically been weak. As global organizations increasingly adopt cloud environments, security strategies have largely focused on “shift-left” practices—securing

Nation-State Attackers Exploiting Ivanti CSA Flaws for Network Infiltration

14/10/2024 0 Comments 0 tags

A suspected nation-state adversary has been observed weaponizing three security flaws in Ivanti Cloud Service Appliance (CSA) a zero-day to perform a series of malicious actions. That’s according to findings

Critical Veeam Vulnerability Exploited to Spread Akira and Fog Ransomware

14/10/2024 0 Comments 0 tags

Threat actors are actively attempting to exploit a now-patched security flaw in Veeam Backup & Replication to deploy Akira and Fog ransomware. Cybersecurity vendor Sophos said it has been tracking