Alert: GhostSec and Stormous Launch Joint Ransomware Attacks in Over 15 Countries

06/03/2024 0 Comments 0 tags

The cybercrime group called GhostSec has been linked to a Golang variant of a ransomware family called GhostLocker. “TheGhostSec and Stormous ransomware groups are jointly conducting double extortion ransomware attacks on

Hackers Exploit ConnectWise ScreenConnect Flaws to Deploy TODDLERSHARK Malware

05/03/2024 0 Comments 0 tags

North Korean threat actors have exploited the recently disclosed security flaws in ConnectWise ScreenConnect to deploy a new malware called TODDLERSHARK. According to a report shared by Kroll with The Hacker

Over 225,000 Compromised ChatGPT Credentials Up for Sale on Dark Web Markets

05/03/2024 0 Comments 0 tags

More than 225,000 logs containing compromised OpenAI ChatGPT credentials were made available for sale on underground markets between January and October 2023, new findings from Group-IB show. These credentials were

Cybercriminals Using Novel DNS Hijacking Technique for Investment Scams

05/03/2024 0 Comments 0 tags

A new DNS threat actor dubbed Savvy Seahorse is leveraging sophisticated techniques to entice targets into fake investment platforms and steal funds. “Savvy Seahorse is a DNS threat actor who convinces victims

What is Exposure Management and How Does it Differ from ASM?

05/03/2024 0 Comments 0 tags

Startups and scales-ups are often cloud-first organizations and rarely have sprawling legacy on-prem environments. Likewise, knowing the agility and flexibility that cloud environments provide, the mid-market is predominantly running in

Warning: Thread Hijacking Attack Targets IT Networks, Stealing NTLM Hashes

05/03/2024 0 Comments 0 tags

The threat actor known as TA577 has been observed using ZIP archive attachments in phishing emails with an aim to steal NT LAN Manager (NTLM) hashes. The new attack chain “can be

Critical JetBrains TeamCity On-Premises Flaws Could Lead to Server Takeovers

05/03/2024 0 Comments 0 tags

A new pair of security vulnerabilities have been disclosed in JetBrains TeamCity On-Premises software that could be exploited by a threat actor to take control of affected systems. The flaws,

Over 100 Malicious AI/ML Models Found on Hugging Face Platform

04/03/2024 0 Comments 0 tags

As many as 100 malicious artificial intelligence (AI)/machine learning (ML) models have been discovered in the Hugging Face platform. These include instances where loading a pickle file leads to code execution, software

From 500 to 5000 Employees – Securing 3rd Party App-Usage in Mid-Market Companies

04/03/2024 0 Comments 0 tags

A company’s lifecycle stage, size, and state have a significant impact on its security needs, policies, and priorities. This is particularly true for modern mid-market companies that are either experiencing

How Cybercriminals are Exploiting India’s UPI for Money Laundering Operations

04/03/2024 0 Comments 0 tags

Cybercriminals are using a network of hired money mules in India using an Android-based application to orchestrate a massive money laundering scheme. The malicious application, called XHelper, is a “key tool