Microsoft Warns: North Korean Hackers Turn to AI-Fueled Cyber Espionage

22/04/2024 0 Comments 0 tags

Microsoft has revealed that North Korea-linked state-sponsored cyber actors has begun to use artificial intelligence (AI) to make its operations more effective and efficient. “They are learning to use tools

New RedLine Stealer Variant Disguised as Game Cheats Using Lua Bytecode for Stealth

21/04/2024 0 Comments 0 tags

A new information stealer has been found leveraging Lua bytecode for added stealth and sophistication, findings from McAfee Labs reveal. The cybersecurity firm has assessed it to be a variant

Critical Update: CrushFTP Zero-Day Flaw Exploited in Targeted Attacks

20/04/2024 0 Comments 0 tags

Users of the CrushFTP enterprise file transfer software are being urged to update to the latest version following the discovery of a security flaw that has come under targeted exploitation in the wild. “CrushFTP v11

Palo Alto Networks Discloses More Details on Critical PAN-OS Flaw Under Attack

20/04/2024 0 Comments 0 tags

Palo Alto Networks has shared more details of a critical security flaw impacting PAN-OS that has come under active exploitation in the wild by malicious actors. The company described the vulnerability, tracked as CVE-2024-3400 (CVSS

BlackTech Targets Tech, Research, and Gov Sectors New ‘Deuterbear’ Tool

19/04/2024 0 Comments 0 tags

Technology, research, and government sectors in the Asia-Pacific region have been targeted by a threat actor called BlackTech as part of a recent cyber attack wave. The intrusions pave the way for an

Akira Ransomware Gang Extorts $42 Million; Now Targets Linux Servers

19/04/2024 0 Comments 0 tags

Threat actors behind the Akira ransomware group have extorted approximately $42 million in illicit proceeds after breaching the networks of more than 250 victims as of January 1, 2024. “Since

How Attackers Can Own a Business Without Touching the Endpoint

19/04/2024 0 Comments 0 tags

Attackers are increasingly making use of “networkless” attack techniques targeting cloud apps and identities. Here’s how attackers can (and are) compromising organizations – without ever needing to touch the endpoint or conventional networked systems and services. 

Hackers Target Middle East Governments with Evasive “CR4T” Backdoor

19/04/2024 0 Comments 0 tags

Government entities in the Middle East have been targeted as part of a previously undocumented campaign to deliver a new backdoor dubbed CR4T. Russian cybersecurity company Kaspersky said it discovered the activity

FIN7 Cybercrime Group Targeting U.S. Auto Industry with Carbanak Backdoor

18/04/2024 0 Comments 0 tags

The infamous cybercrime syndicate known as FIN7 has been linked to a spear-phishing campaign targeting the U.S. automotive industry to deliver a known backdoor called Carbanak (aka Anunak). “FIN7 identified

OfflRouter Malware Evades Detection in Ukraine for Almost a Decade

18/04/2024 0 Comments 0 tags

Select Ukrainian government networks have remained infected with a malware called OfflRouter since 2015. Cisco Talos said its findings are based on an analysis of over 100 confidential documents that