The Secret Weakness Execs Are Overlooking: Non-Human Identities

03/10/2024 0 Comments 0 tags

For years, securing a company’s systems was synonymous with securing its “perimeter.” There was what was safe “inside” and the unsafe outside world. We built sturdy firewalls and deployed sophisticated

Android 14 Adds New Security Features to Block 2G Exploits and Baseband Attacks

03/10/2024 0 Comments 0 tags

Google has revealed the various security guardrails that have been incorporated into its latest Pixel devices to counter the rising threat posed by baseband security attacks. The cellular baseband (i.e.,

LockBit Ransomware and Evil Corp Members Arrested and Sanctioned in Joint Global Effort

03/10/2024 0 Comments 0 tags

A new wave of international law enforcement actions has led to four arrests and the takedown of nine servers linked to the LockBit (aka Bitwise Spider) ransomware operation, marking the

INTERPOL Arrests 8 in Major Phishing and Romance Fraud Crackdown in West Africa

03/10/2024 0 Comments 0 tags

INTERPOL has announced the arrest of eight individuals in Côte d’Ivoire and Nigeria as part of a crackdown on phishing scams and romance cyber fraud. Dubbed Operation Contender 2.0, the

North Korean Hackers Using New VeilShell Backdoor in Stealthy Cyber Attacks

03/10/2024 0 Comments 0 tags

Threat actors with ties to North Korea have been observed delivering a previously undocumented backdoor and remote access trojan (RAT) called VeilShell as part of a campaign targeting Cambodia and

New Perfctl Malware Targets Linux Servers for Cryptocurrency Mining and Proxyjacking

03/10/2024 0 Comments 0 tags

Linux servers are the target of an ongoing campaign that delivers a stealthy malware dubbed perfctl with the primary aim of running a cryptocurrency miner and proxyjacking software. “Perfctl is

Ivanti Endpoint Manager Flaw Actively Targeted, CISA Warns Agencies to Patch

03/10/2024 0 Comments 0 tags

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Wednesday added a security flaw impacting Endpoint Manager (EPM) that the company patched in May to its Known Exploited Vulnerabilities (KEV)

China-Linked CeranaKeeper Targeting Southeast Asia with Data Exfiltration

02/10/2024 0 Comments 0 tags

A previously undocumented threat actor called CeranaKeeper has been linked to a string of data exfiltration attacks targeting Southeast Asia. Slovak cybersecurity firm ESET, which observed campaigns targeting governmental institutions

Fake Trading Apps Target Victims Globally via Apple App Store and Google Play

02/10/2024 0 Comments 0 tags

A large-scale fraud campaign leveraged fake trading apps published on the Apple App Store and Google Play Store, as well as phishing sites, to defraud victims, per findings from Group-IB.

Fake Job Applications Deliver Dangerous More_eggs Malware to HR Professionals

02/10/2024 0 Comments 0 tags

A spear-phishing email campaign has been observed targeting recruiters with a JavaScript backdoor called More_eggs, indicating persistent efforts to single out the sector under the guise of fake job applicant