China-Linked Group Breaches Networks via Connectwise, F5 Software Flaws

22/03/2024 0 Comments 0 tags

A China-linked threat cluster leveraged security flaws in Connectwise ScreenConnect and F5 BIG-IP software to deliver custom malware capable of delivering additional backdoors on compromised Linux hosts as part of

U.S. Justice Department Sues Apple Over Monopoly and Messaging Security

22/03/2024 0 Comments 0 tags

The U.S. Department of Justice (DoJ), along with 16 other state and district attorneys general, on Thursday accused Apple of illegally maintaining a monopoly over smartphones, thereby undermining, among others, security and

Russian Hackers Target Ukrainian Telecoms with Upgraded ‘AcidPour’ Malware

22/03/2024 0 Comments 0 tags

The data wiping malware called AcidPour may have been deployed in attacks targeting four telecom providers in Ukraine, new findings from SentinelOne show. The cybersecurity firm also confirmed connections between the malware

Making Sense of Operational Technology Attacks: The Past, Present, and Future

21/03/2024 0 Comments 0 tags

When you read reports about cyber-attacks affecting operational technology (OT), it’s easy to get caught up in the hype and assume every single one is sophisticated. But are OT environments

GitHub Launches AI-Powered Autofix Tool to Assist Devs in Patching Security Flaws

21/03/2024 0 Comments 0 tags

GitHub on Wednesday announced that it’s making available a feature called code scanning autofix in public beta for all Advanced Security customers to provide targeted recommendations in an effort to avoid introducing

How to Accelerate Vendor Risk Assessments in the Age of SaaS Sprawl

21/03/2024 0 Comments 0 tags

In today’s digital-first business environment dominated by SaaS applications, organizations increasingly depend on third-party vendors for essential cloud services and software solutions. As more vendors and services are added to

AndroxGh0st Malware Targets Laravel Apps to Steal Cloud Credentials

21/03/2024 0 Comments 0 tags

Cybersecurity researchers have shed light on a tool referred to as AndroxGh0st that’s used to target Laravel applications and steal sensitive data. “It works by scanning and taking out important information from

Over 800 npm Packages Found with Discrepancies, 18 Exploitable to ‘Manifest Confusion’

21/03/2024 0 Comments 0 tags

New research has discovered over 800 packages in the npm registry which have discrepancies from their registry entries, out of which 18 have been found to exploit a technique called manifest

Russia Hackers Using TinyTurla-NG to Breach European NGO’s Systems

21/03/2024 0 Comments 0 tags

The Russia-linked threat actor known as Turla infected several systems belonging to an unnamed European non-governmental organization (NGO) in order to deploy a backdoor called TinyTurla-NG. “The attackers compromised the first

U.S. Sanctions Russians Behind ‘Doppelganger’ Cyber Influence Campaign

21/03/2024 0 Comments 0 tags

The U.S. Treasury Department’s Office of Foreign Assets Control (OFAC) on Wednesday announced sanctions against two 46-year-old Russian nationals and the respective companies they own for engaging in cyber influence