A new malware, Byakugan, emerges via Adobe Acrobat Reader installers, capable of multiple cyber threats including data theft and cryptocurrency mining.
Latest News
Navigating the Cybersecurity Skills Gap: Strategies and Insights
Exploring the cybersecurity skills shortage and strategies for resilience, featuring insights from ESG-ISSA’s report and ISC2’s resources.
New JSOutProx Malware Variant Targets Financial Sectors in APAC and MENA
Experts uncover a pernicious new version of JSOutProx malware focusing on financial institutions, with digital defenses urgently needed.
Emerging Cyber Threats: Rhadamanthys Malware and the Persistent Evolution of Malspam
A look into the surge of sophisticated cyber threats, including Rhadamanthys malware and the evolution of malicious campaigns.
The Hidden Dangers of QR Code Scams and Cybersecurity Tips
This article explores the rising issue of QR code scams and provides crucial tips for enhancing cybersecurity to combat these threats.
Securing OT in the Age of Cyber Threats
Exploring the critical measures needed for securing operational technology (OT) against increasing cyber threats and the rising interplay between OT and IT security.
Ivanti Advances Cybersecurity Measures
Tech firm Ivanti releases critical security updates for Connect Secure and Policy Secure Gateways, reinforcing secure-by-design principles in response to evolving threats.
Ivanti Releases Critical Security Patches
Ivanti has issued critical patches for Connect Secure and Policy Secure Gateways amid rising cybersecurity threats, reinforcing secure by design principles.
The Introduction of CVSS 4.0 and its Impact on Cybersecurity
CVSS 4.0 signifies a monumental leap in cybersecurity threat assessment, bolstering digital defense strategies and shaping the future of exposure management.
Europe Confronts Rising AceCryptor Malware Attacks
The rise of AceCryptor malware in Europe signifies a growing threat as Poland faces over 26,000 attacks. Cybersecurity measures are tested against sophisticated cyber threats.
Critical Cybersecurity Flaws Exposed in WordPress Plugins
Exploring recent cybersecurity breaches and vulnerabilities in WordPress plugins, emphasizing the importance of security updates.
Navigating Cloud Security: The Rise of CTEM
Exploring the significance of Continuous Threat Exposure Management (CTEM) in bolstering cloud security against rising cyber threats.
Google to Overhaul Incognito Mode, Delete Browsing Records
Google is set to delete billions of browsing records and revamp its incognito mode in response to a privacy lawsuit.
Rise of TA558 Phishing Campaigns and Venom RAT Deployments
TA558 launches a major phishing campaign with Venom RAT, targeting various sectors and countries, escalating the urgency for robust cybersecurity.
EventSentry: Tailored Cybersecurity for a Threatening Digital World
Discover how EventSentry offers tailored malware detection and cybersecurity solutions in an era of sophisticated digital threats.
Google Removes 29 Malicious Android Apps Used for RESIPs
Google has clamped down on 29 Android apps operating as residential IP proxies, part of a cunning malware campaign uncovered by HUMAN’s Satori team.
Finland’s Parliament Targeted by Chinese Cyber Espionage Group APT31
The Finnish Police accused APT31, a Chinese cyber espionage group, of infiltrating Finland’s Parliament in 2020, highlighting the urgent need for enhanced cybersecurity measures.
Nefarious DinodasRAT Targets Linux in Cyber Espionage Campaign
Researchers uncover a new cyber threat, DinodasRAT, targeting Linux, alarming the cybersecurity community with its advanced evasion techniques.
PyPI User Registrations Halted Amid Typosquatting Attack
The Python Package Index had to pause new user sign-ups due to an influx of malicious packages using typosquatting methods.
Critical Linux Vulnerabilities: WallEscape and Kernel Flaws Exposed
An alarming vulnerability in util-linux’s ‘wall’ command and a netfilter subsystem flaw threaten Linux security. Learn about WallEscape and kernel risks.
Embracing the Future of Cybersecurity with Automated Penetration Testing
The advent of automated penetration testing marks a transformative period in cybersecurity, offering relentless defense against the shadows of cyber threats.
The Resurgence of TheMoon Botnet: A Threat to Cybersecurity
TheMoon botnet has returned, exploiting end-of-life devices and collaborating with the Faceless service, posing a renewed threat to cybersecurity and financial industries.
Rising macOS Threats: Navigating the Malware Pandemonium
Sophisticated malware campaigns are targeting macOS users, exploiting legitimate platforms to steal sensitive information. Learn how to protect yourself.
RedHat Warns of Critical Backdoor in XZ Utils Software
An urgent security alert has been issued by RedHat due to a critical backdoor found in XZ Utils, affecting major Linux distributions.
Vulnerabilities in Hotel RFID Locks Expose Global Security Risks
Researchers discover vulnerabilities in hotel electronic RFID locks, codenamed Unsaflok, affecting millions of doors worldwide.
U.S. Charges Seven Chinese Nationals of Hacking Group APT40
The U.S. has charged seven Chinese nationals from hacking group APT40 for cyber espionage, marking a serious stance against global cyber threats.
U.S. Targets Cryptocurrency Exchanges in Sanctions Sweep
The U.S. Treasury tightens its sanctions regime by targeting three cryptocurrency exchanges aiding Russia’s evasion of economic restrictions imposed due to its actions in Ukraine.
CISA Updates Known Exploited Vulnerabilities Catalog
The CISA updates its Known Exploited Vulnerabilities Catalog, highlighting active exploits in cybersecurity products and the urgency to secure digital systems against a variety of cyberattacks.
Microsoft Hack: Midnight Blizzard’s Wake-Up Call for Cyber Vigilance
An in-depth analysis of the recent Microsoft hack by Russian-state actors, underscoring the vital need for heightened cybersecurity measures.
GitHub Supply Chain Attack Targets Top.gg and Individual Developers
Attackers compromised GitHub organization accounts in a supply chain attack, impacting Top.gg and developers with stolen credentials and malicious code.
Apple Faces ‘GoFetch’ Vulnerability in M-Series Chips
Apple’s M-series chips are threatened by ‘GoFetch,’ a vulnerability exploiting the data memory-dependent prefetcher to leak encryption keys.
U.S. Intensifies Cyber Crackdown with Sanctions and Covert Ops
The U.S. Treasury sanctions Russian entities for cyber influence operations amid broader efforts to counter disinformation and cybersecurity threats.
GitHub Enhances Cybersecurity with AI-Driven Autofix Tool
GitHub unveils a new AI-driven code scanning autofix feature to enhance developers’ defense against cyber threats.
Npm Package Vulnerability: The Rising Threat of Manifest Confusion
Researchers uncover a critical npm package vulnerability, ‘manifest confusion’, posing a severe risk to software integrity and security.
Turla Espionage Group Strikes European NGOs with Advanced Malware
The Russia-linked espionage group Turla has launched sophisticated cyber-attacks on European NGOs, displaying the intricate nature of state-sponsored hacking.
North Korea’s Kimsuky Group Ups Ante with CHM File Malware
The North Korean Kimsuky group deploys CHM files as Trojan horses, advancing cyber espionage and Artificial Intelligence for malicious purposes.
German Authorities Seize ‘Nemesis Market’ in Major Cybercrime Crackdown
German police have dismantled ‘Nemesis Market,’ a key darknet marketplace for narcotics and cybercrime services, marking a significant success in combating cybercrime.
Sign1 Malware Campaign Strikes Over 39,000 WordPress Sites
The Sign1 malware campaign has compromised over 39,000 WordPress websites with complex JavaScript injections, showcasing the need for robust cybersecurity.
Revolutionizing Cybersecurity: Zero Trust and Compliance
Explore how ThreatLocker’s Zero Trust Endpoint Protection Platform is reshaping cybersecurity measures and aiding in compliance amid surging ransomware attacks.
China-linked UNC5174 Ramps Up Global Cyber Attacks
UNC5174, linked to China’s MSS, escalates cyber warfare with sophisticated campaigns exploiting high-profile vulnerabilities.
WINELOADER Malware and State-Backed Cyber Espionage Intensify
State-sponsored cyber espionage campaigns intensify, leveraging WINELOADER malware against political entities.
Rise of Phishing Attacks: StelaStealer’s EU and US Rampage
A fresh wave of sophisticated phishing attacks exploiting StrelaStealer malware targets over 100 EU and US organizations, highlighting the urgent need for vigilance.
FlowFixation: Critical AWS Vulnerability Unveiled and Mitigated
A crucial vulnerability in AWS Managed Workflows for Apache Airflow, known as FlowFixation, has been swiftly addressed by AWS to prevent potential cyber threats.
Unveiling AcidPour: The Next-Gen Data Wiper Threatening Global Cybersecurity
AcidPour emerges as a sophisticated cyber weapon targeting critical infrastructure, highlighting the continuous evolution of the cyber warfare landscape.
Apple’s Market Dominance Challenged by DOJ Lawsuit
The DOJ accuses Apple of monopolistic practices, potentially shaking up the smartphone industry.
AcidPour Malware Targets Ukrainian Telecoms
AcidPour malware emerges as a significant cyber threat to Ukrainian telecoms, a new variant with destructive prowess linked to Russian military intelligence.
Emerging Laravel Malware AndroxGh0st Endangers Cloud Credentials
A new malware, AndroxGh0st, threatens Laravel applications by exploiting vulnerabilities to steal cloud credentials.
Navigating SaaS Sprawl: The Rise of Zero-Trust Cybersecurity
With SaaS sprawl on the rise, businesses adopt zero-trust cybersecurity strategies to manage emerging risks in a cloud-centric world.
Navigating the Cyber Threat Landscape in OT Environments
Exploring the escalation of cyber threats in OT environments and the stark evolution of attack tactics requiring heightened cybersecurity vigilance.
Security Alert: Atlassian Unveils Patch for Critical Bamboo Bug
Atlassian patches a severe SQL injection bug in Bamboo Data Center and Server amidst multiple high-severity flaws.