Dormant PyPI Package Compromised to Spread Nova Sentinel Malware

23/02/2024 0 Comments 0 tags

A dormant package available on the Python Package Index (PyPI) repository was updated nearly after two years to propagate an information stealer malware called Nova Sentinel. The package, named django-log-tracker, was

Apple Unveils PQ3 Protocol – Post-Quantum Encryption for iMessage

23/02/2024 0 Comments 0 tags

Apple has announced a new post-quantum cryptographic protocol called PQ3 that it said will be integrated into iMessage to secure the messaging platform against future attacks arising from the threat of a

FTC Slams Avast with $16.5 Million Fine for Selling Users’ Browsing Data

23/02/2024 0 Comments 0 tags

The U.S. Federal Trade Commission (FTC) has hit antivirus vendor Avast with a $16.5 million fine over charges that the firm sold users’ browsing data to advertisers after claiming its

U.S. Offers $15 Million Bounty to Hunt Down LockBit Ransomware Leaders

22/02/2024 0 Comments 0 tags

The U.S. State Department has announced monetary rewards of up to $15 million for information that could lead to the identification of key leaders within the LockBit ransomware group and

Russian Government Software Backdoored to Deploy Konni RAT Malware

22/02/2024 0 Comments 0 tags

An installer for a tool likely used by the Russian Consular Department of the Ministry of Foreign Affairs (MID) has been backdoored to deliver a remote access trojan called Konni RAT (aka UpDog).

A New Age of Hacktivism

22/02/2024 0 Comments 0 tags

In the past 2 years, we have observed a significant surge in hacktivism activity due to ongoing wars and geopolitical conflicts in various regions. Since the war against Ukraine began,

Cybercriminals Weaponizing Open-Source SSH-Snake Tool for Network Attacks

22/02/2024 0 Comments 0 tags

A recently open-sourced network mapping tool called SSH-Snake has been repurposed by threat actors to conduct malicious activities. “SSH-Snake is a self-modifying worm that leverages SSH credentials discovered on a compromised system

Cybersecurity for Healthcare—Diagnosing the Threat Landscape and Prescribing Solutions for Recovery

21/02/2024 0 Comments 0 tags

On Thanksgiving Day 2023, while many Americans were celebrating, hospitals across the U.S. were doing quite the opposite. Systems were failing. Ambulances were diverted. Care was impaired. Hospitals in three

6 Ways to Simplify SaaS Identity Governance

21/02/2024 0 Comments 0 tags

With SaaS applications now making up the vast majority of technology used by employees in most organizations, tasks related to identity governance need to happen across a myriad of individual

Mustang Panda Targets Asia with Advanced PlugX Variant DOPLUGS

21/02/2024 0 Comments 0 tags

The China-linked threat actor known as Mustang Panda has targeted various Asian countries using a variant of the PlugX (aka Korplug) backdoor dubbed DOPLUGS. “The piece of customized PlugX malware