Beware: GitHub’s Fake Popularity Scam Tricking Developers into Downloading Malware

10/04/2024 0 Comments 0 tags

Threat actors are now taking advantage of GitHub’s search functionality to trick unsuspecting users looking for popular repositories into downloading spurious counterparts that serve malware. The latest assault on the

Hands-on Review: Cynomi AI-powered vCISO Platform

10/04/2024 0 Comments 0 tags

The need for vCISO services is growing. SMBs and SMEs are dealing with more third-party risks, tightening regulatory demands and stringent cyber insurance requirements than ever before. However, they often

Webinar: Learn How to Stop Hackers from Exploiting Hidden Identity Weaknesses

10/04/2024 0 Comments 0 tags

We all know passwords and firewalls are important, but what about the invisible threats lurking beneath the surface of your systems? Identity Threat Exposures (ITEs) are like secret tunnels for

Researchers Uncover First Native Spectre v2 Exploit Against Linux Kernel

10/04/2024 0 Comments 0 tags

Cybersecurity researchers have disclosed what they say is the “first native Spectre v2 exploit” against the Linux kernel on Intel systems that could be exploited to read sensitive data from

Microsoft Fixes 149 Flaws in Huge April Patch Release, Zero-Days Included

10/04/2024 0 Comments 0 tags

Microsoft has released security updates for the month of April 2024 to remediate a record 149 flaws, two of which have come under active exploitation in the wild. Of the 149

Critical ‘BatBadBut’ Rust Vulnerability Exposes Windows Systems to Attacks

10/04/2024 0 Comments 0 tags

A critical security flaw in the Rust standard library could be exploited to target Windows users and stage command injection attacks. The vulnerability, tracked as CVE-2024-24576, has a CVSS score of

Researchers Discover LG Smart TV Vulnerabilities Allowing Root Access

09/04/2024 0 Comments 0 tags

Multiple security vulnerabilities have been disclosed in LG webOS running on its smart televisions that could be exploited to bypass authorization and gain root access on the devices. The findings

Hackers Targeting Human Rights Activists in Morocco and Western Sahara

09/04/2024 0 Comments 0 tags

Human rights activists in Morocco and the Western Sahara region are the targets of a new threat actor that leverages phishing attacks to trick victims into installing bogus Android apps

10-Year-Old ‘RUBYCARP’ Romanian Hacker Group Surfaces with Botnet

09/04/2024 0 Comments 0 tags

A threat group of suspected Romanian origin called RUBYCARP has been observed maintaining a long-running botnet for carrying out crypto mining, distributed denial-of-service (DDoS), and phishing attacks. The group, believed to be

Attackers Using Obfuscation Tools to Deliver Multi-Stage Malware via Invoice Phishing

09/04/2024 0 Comments 0 tags

Cybersecurity researchers have discovered an intricate multi-stage attack that leverages invoice-themed phishing decoys to deliver a wide range of malware such as Venom RAT, Remcos RAT, XWorm, NanoCore RAT, and a