Phobos Ransomware Aggressively Targeting U.S. Critical Infrastructure

04/03/2024 0 Comments 0 tags

U.S. cybersecurity and intelligence agencies have warned of Phobos ransomware attacks targeting government and critical infrastructure entities, outlining the various tactics and techniques the threat actors have adopted to deploy the file-encrypting

U.S. Charges Iranian Hacker, Offers $10 Million Reward for Capture

02/03/2024 0 Comments 0 tags

The U.S. Department of Justice (DoJ) on Friday unsealed an indictment against an Iranian national for his alleged involvement in a multi-year cyber-enabled campaign designed to compromise U.S. governmental and

U.S. Court Orders NSO Group to Hand Over Pegasus Spyware Code to WhatsApp

02/03/2024 0 Comments 0 tags

A U.S. judge has ordered NSO Group to hand over its source code for Pegasus and other products to Meta as part of the social media giant’s ongoing litigation against the Israeli

New BIFROSE Linux Malware Variant Using Deceptive VMware Domain for Evasion

02/03/2024 0 Comments 0 tags

Cybersecurity researchers have discovered a new Linux variant of a remote access trojan (RAT) called BIFROSE (aka Bifrost) that uses a deceptive domain mimicking VMware. “This latest version of Bifrost

4 Instructive Postmortems on Data Downtime and Loss

02/03/2024 0 Comments 0 tags

More than a decade ago, the concept of the ‘blameless’ postmortem changed how tech companies recognize failures at scale. John Allspaw, who coined the term during his tenure at Etsy, argued postmortems

New Phishing Kit Leverages SMS, Voice Calls to Target Cryptocurrency Users

02/03/2024 0 Comments 0 tags

A novel phishing kit has been observed impersonating the login pages of well-known cryptocurrency services as part of an attack cluster designed to primarily target mobile devices. “This kit enables

GitHub Rolls Out Default Secret Scanning Push Protection for Public Repositories

01/03/2024 0 Comments 0 tags

GitHub on Thursday announced that it’s enabling secret scanning push protection by default for all pushes to public repositories. “This means that when a supported secret is detected in any

Five Eyes Agencies Warn of Active Exploitation of Ivanti Gateway Vulnerabilities

01/03/2024 0 Comments 0 tags

The Five Eyes (FVEY) intelligence alliance has issued a new cybersecurity advisory warning of cyber threat actors exploiting known security flaws in Ivanti Connect Secure and Ivanti Policy Secure gateways,

New Silver SAML Attack Evades Golden SAML Defenses in Identity Systems

29/02/2024 0 Comments 0 tags

Cybersecurity researchers have disclosed a new attack technique called Silver SAML that can be successful even in cases where mitigations have been applied against Golden SAML attacks. Silver SAML “enables the exploitation

Lazarus Exploits Typos to Sneak PyPI Malware into Dev Systems

29/02/2024 0 Comments 0 tags

The notorious North Korean state-backed hacking group Lazarus uploaded four packages to the Python Package Index (PyPI) repository with the goal of infecting developer systems with malware. The packages, now