North Korean Hackers Targeting Developers with Malicious npm Packages

27/02/2024 0 Comments 0 tags

A set of fake npm packages discovered on the Node.js repository has been found to share ties with North Korean state-sponsored actors, new findings from Phylum show. The packages are

8,000+ Domains of Trusted Brands Hijacked for Massive Spam Operation

27/02/2024 0 Comments 0 tags

More than 8,000 domains and 13,000 subdomains belonging to legitimate brands and institutions have been hijacked as part of a sophisticated distribution architecture for spam proliferation and click monetization. Guardio

New IDAT Loader Attacks Using Steganography to Deploy Remcos RAT

27/02/2024 0 Comments 0 tags

Ukrainian entities based in Finland have been targeted as part of a malicious campaign distributing a commercial remote access trojan known as Remcos RAT using a malware loader called IDAT

LockBit Ransomware Group Resurfaces After Law Enforcement Takedown

26/02/2024 0 Comments 0 tags

The threat actors behind the LockBit ransomware operation have resurfaced on the dark web using new infrastructure, days after an international law enforcement exercise seized control of its servers. To that end,

Authorities Claim LockBit Admin “LockBitSupp” Has Engaged with Law Enforcement

25/02/2024 0 Comments 0 tags

LockBitSupp, the individual(s) behind the persona representing the LockBit ransomware service on cybercrime forums such as Exploit and XSS, “has engaged with law enforcement,” authorities said. The development comes following

Microsoft Expands Free Logging Capabilities for all U.S. Federal Agencies

24/02/2024 0 Comments 0 tags

Microsoft has expanded free logging capabilities to all U.S. federal agencies using Microsoft Purview Audit irrespective of the license tier, more than six months after a China-linked cyber espionage campaign

Researchers Detail Apple’s Recent Zero-Click Shortcuts Vulnerability

23/02/2024 0 Comments 0 tags

Details have emerged about a now-patched high-severity security flaw in Apple’s Shortcuts app that could permit a shortcut to access sensitive information on the device without users’ consent. The vulnerability,

How to Use Tines’s SOC Automation Capability Matrix

23/02/2024 0 Comments 0 tags

Created by John Tuckner and the team at workflow and automation platform Tines, the SOC Automation Capability Matrix (SOC ACM) is a set of techniques designed to help security operations teams understand their

Microsoft Releases PyRIT – A Red Teaming Tool for Generative AI

23/02/2024 0 Comments 0 tags

Microsoft has released an open access automation framework called PyRIT (short for Python Risk Identification Tool) to proactively identify risks in generative artificial intelligence (AI) systems. The red teaming tool is designed

Dormant PyPI Package Compromised to Spread Nova Sentinel Malware

23/02/2024 0 Comments 0 tags

A dormant package available on the Python Package Index (PyPI) repository was updated nearly after two years to propagate an information stealer malware called Nova Sentinel. The package, named django-log-tracker, was