New Cyberattack Targets Chinese-Speaking Businesses with Cobalt Strike Payloads

30/08/2024 0 Comments 0 tags

Chinese-speaking users are the target of a “highly organized and sophisticated attack” campaign that is likely leveraging phishing emails to infect Windows systems with Cobalt Strike payloads. “The attackers managed

SANS Institute Unveils Critical Infrastructure Strategy Guide for 2024: A Call to Action for Securing ICS/OT Environments

30/08/2024 0 Comments 0 tags

A comprehensive guide authored by Dean Parsons emphasizes the growing need for specialized ICS security measures in the face of rising cyber threats. With a staggering 50% increase in ransomware

North Korean Hackers Target Developers with Malicious npm Packages

30/08/2024 0 Comments 0 tags

Threat actors with ties to North Korea have been observed publishing a set of malicious packages to the npm registry, indicating “coordinated and relentless” efforts to target developers with malware

Russian Hackers Exploit Safari and Chrome Flaws in High-Profile Cyberattack

29/08/2024 0 Comments 0 tags

Cybersecurity researchers have flagged multiple in-the-wild exploit campaigns that leveraged now-patched flaws in Apple Safari and Google Chrome browsers to infect mobile users with information-stealing malware. “These campaigns delivered n-day

Vietnamese Human Rights Group Targeted in Multi-Year Cyberattack by APT32

29/08/2024 0 Comments 0 tags

A non-profit supporting Vietnamese human rights has been the target of a multi-year campaign designed to deliver a variety of malware on compromised hosts. Cybersecurity company Huntress attributed the activity

Unpatched AVTECH IP Camera Flaw Exploited by Hackers for Botnet Attacks

29/08/2024 0 Comments 0 tags

A years-old high-severity flaw impacting AVTECH IP cameras has been weaponized by malicious actors as a zero-day to rope them into a botnet. CVE-2024-7029 (CVSS score: 8.7), the vulnerability in

How AitM Phishing Attacks Bypass MFA and EDR—and How to Fight Back

29/08/2024 0 Comments 0 tags

Attackers are increasingly using new phishing toolkits (open-source, commercial, and criminal) to execute adversary-in-the-middle (AitM) attacks. AitM enables attackers to not just harvest credentials but steal live sessions, allowing them

U.S. Agencies Warn of Iranian Hacking Group’s Ongoing Ransomware Attacks

29/08/2024 0 Comments 0 tags

U.S. cybersecurity and intelligence agencies have called out an Iranian hacking group for breaching multiple organizations across the country and coordinating with affiliates to deliver ransomware. The activity has been

French Authorities Charge Telegram CEO with Facilitating Criminal Activities on Platform

29/08/2024 0 Comments 0 tags

French prosecutors on Wednesday formally charged CEO Pavel Durov with facilitating a litany of criminal activity on the popular messaging platform and placed him under formal investigation following his arrest

Fortra Issues Patch for High-Risk FileCatalyst Workflow Security Vulnerability

28/08/2024 0 Comments 0 tags

Fortra has addressed a critical security flaw impacting FileCatalyst Workflow that could be abused by a remote attacker to gain administrative access. The vulnerability, tracked as CVE-2024-6633, carries a CVSS