• Hackers Exploit Webview2 to Deploy CoinLurker Malware and Evade Security Detection

    Hackers Exploit Webview2 to Deploy CoinLurker Malware and Evade Security Detection

    Bogus software update lures are being used by threat actors to deliver a new stealer malware called CoinLurker. “Written in Go, CoinLurker employs cutting-edge obfuscation and anti-analysis techniques, making it a highly effective tool in modern cyber attacks,” Morphisec researcher Nadav Lorber said in a technical report published Monday. The attacks make use of fake…

    Read More

  • The Mask APT Resurfaces with Sophisticated Multi-Platform Malware Arsenal

    The Mask APT Resurfaces with Sophisticated Multi-Platform Malware Arsenal

    A little-known cyber espionage actor known as The Mask has been linked to a new set of attacks targeting an unnamed organization in Latin America twice in 2019 and 2022. “The Mask APT is a legendary threat actor that has been performing highly sophisticated attacks since at least 2007,” Kaspersky researchers Georgy Kucherin and Marc…

    Read More

  • DeceptionAds Delivers 1M+ Daily Impressions via 3,000 Sites, Fake CAPTCHA Pages

    DeceptionAds Delivers 1M+ Daily Impressions via 3,000 Sites, Fake CAPTCHA Pages

    Cybersecurity researchers have shed light on a previously undocumented aspect associated with ClickFix-style attacks that hinge on taking advantage of a single ad network service as part of a malvertising-driven information stealer campaign dubbed DeceptionAds. “Entirely reliant on a single ad network for propagation, this campaign showcases the core mechanisms of malvertising — delivering over

    Read More

  • NoviSpy Spyware Installed on Journalist’s Phone After Unlocking It With Cellebrite Tool

    NoviSpy Spyware Installed on Journalist’s Phone After Unlocking It With Cellebrite Tool

    A Serbian journalist had his phone first unlocked by a Cellebrite tool and subsequently compromised by a previously undocumented spyware codenamed NoviSpy, according to a new report published by Amnesty International. “NoviSpy allows for capturing sensitive personal data from a target’s phone after infection and provides the ability to turn on the phone’s microphone or…

    Read More

  • ⚡ THN Weekly Recap: Top Cybersecurity Threats, Tools and Tips

    ⚡ THN Weekly Recap: Top Cybersecurity Threats, Tools and Tips

    This past week has been packed with unsettling developments in the world of cybersecurity. From silent but serious attacks on popular business tools to unexpected flaws lurking in everyday devices, there’s a lot that might have flown under your radar. Attackers are adapting old tricks, uncovering new ones, and targeting systems both large and small.…

    Read More

  • Data Governance in DevOps: Ensuring Compliance in the AI Era

    Data Governance in DevOps: Ensuring Compliance in the AI Era

    With the evolution of modern software development, CI/CD pipeline governance has emerged as a critical factor in maintaining both agility and compliance. As we enter the age of artificial intelligence (AI), the importance of robust pipeline governance has only intensified. With that said, we’ll explore the concept of CI/CD pipeline governance and why it’s vital,…

    Read More

  • New Investment Scam Leverages AI, Social Media Ads to Target Victims Worldwide

    New Investment Scam Leverages AI, Social Media Ads to Target Victims Worldwide

    Cybersecurity researchers are calling attention to a new kind of investment scam that leverages a combination of social media malvertising, company-branded posts, and artificial intelligence (AI) powered video testimonials featuring famous personalities, ultimately leading to financial and data loss. “The main goal of the fraudsters is to lead victims to phishing websites and forms that…

    Read More

  • How Can Small Businesses Embrace the Cashless Revolution? 

    How Can Small Businesses Embrace the Cashless Revolution? 

    Read More

  • 390,000+ WordPress Credentials Stolen via Malicious GitHub Repository Hosting PoC Exploits

    390,000+ WordPress Credentials Stolen via Malicious GitHub Repository Hosting PoC Exploits

    A now-removed GitHub repository that advertised a WordPress tool to publish posts to the online content management system (CMS) is estimated to have enabled the exfiltration of over 390,000 credentials. The malicious activity is part of a broader attack campaign undertaken by a threat actor, dubbed MUT-1244 (where MUT refers to “mysterious unattributed threat”) by…

    Read More

  • Germany Disrupts BADBOX Malware on 30,000 Devices Using Sinkhole Action

    Germany Disrupts BADBOX Malware on 30,000 Devices Using Sinkhole Action

    Germany’s Federal Office of Information Security (BSI) has announced that it has disrupted a malware operation called BADBOX that came preloaded on at least 30,000 internet-connected devices sold across the country. In a statement published earlier this week, authorities said they severed the communications between the devices and their command-and-control (C2) servers by sinkholing the…

    Read More