• Ultralytics AI Library Compromised: Cryptocurrency Miner Found in PyPI Versions

    Ultralytics AI Library Compromised: Cryptocurrency Miner Found in PyPI Versions

    In yet another software supply chain attack, it has come to light that two versions of a popular Python artificial intelligence (AI) library named ultralytics were compromised to deliver a cryptocurrency miner. The versions, 8.3.41 and 8.3.42, have since been removed from the Python Package Index (PyPI) repository. A subsequently released version has introduced a…

    Read More

  • Hackers Using Fake Video Conferencing Apps to Steal Web3 Professionals’ Data

    Hackers Using Fake Video Conferencing Apps to Steal Web3 Professionals’ Data

    Cybersecurity researchers have warned of a new scam campaign that leverages fake video conferencing apps to deliver an information stealer called Realst targeting people working in Web3 under the guise of fake business meetings. “The threat actors behind the malware have set up fake companies using AI to make them increase legitimacy,” Cado Security researcher…

    Read More

  • Romania Cancels Presidential Election Results After Alleged Russian Meddling on TikTok

    Romania Cancels Presidential Election Results After Alleged Russian Meddling on TikTok

    In a historic decision, Romania’s constitutional court has annulled the result of the first round of voting in the presidential election amid allegations of Russian interference. As a result, the second round vote, which was scheduled for December 8, 2024, will no longer take place. Călin Georgescu, who won the first round, denounced the verdict…

    Read More

  • FSB Uses Trojan App to Monitor Russian Programmer Accused of Supporting Ukraine

    FSB Uses Trojan App to Monitor Russian Programmer Accused of Supporting Ukraine

    A Russian programmer accused of donating money to Ukraine had his Android device secretly implanted with spyware by the Federal Security Service (FSB) after he was detained earlier this year. The findings come as part of a collaborative investigation by First Department and the University of Toronto’s Citizen Lab. “The spyware placed on his device…

    Read More

  • This $3,000 Android Trojan Targeting Banks and Cryptocurrency Exchanges

    This $3,000 Android Trojan Targeting Banks and Cryptocurrency Exchanges

    As many as 77 banking institutions, cryptocurrency exchanges, and national organizations have become the target of a newly discovered Android remote access trojan (RAT) called DroidBot. “DroidBot is a modern RAT that combines hidden VNC and overlay attack techniques with spyware-like capabilities, such as keylogging and user interface monitoring,” Cleafy researchers Simone Mattia, Alessandro

    Read More

  • Critical Mitel MiCollab Flaw Exposes Systems to Unauthorized File and Admin Access

    Critical Mitel MiCollab Flaw Exposes Systems to Unauthorized File and Admin Access

    Cybersecurity researchers have released a proof-of-concept (PoC) exploit that strings together a now-patched critical security flaw impacting Mitel MiCollab with an arbitrary file read zero-day, granting an attacker the ability to access files from susceptible instances. The critical vulnerability in question is CVE-2024-41713 (CVSS score: 9.8), which relates to a case of insufficient input

    Read More

  • Europol Shuts Down Manson Market Fraud Marketplace, Seizes 50 Servers

    Europol Shuts Down Manson Market Fraud Marketplace, Seizes 50 Servers

    Europol on Thursday announced the shutdown of a clearnet marketplace called Manson Market that facilitated online fraud on a large scale. The operation, led by German authorities, has resulted in the seizure of more than 50 servers associated with the service and the arrest of two suspects. More than 200 terabytes of digital evidence have…

    Read More

  • Want to Grow Vulnerability Management into Exposure Management? Start Here!

    Want to Grow Vulnerability Management into Exposure Management? Start Here!

    Vulnerability Management (VM) has long been a cornerstone of organizational cybersecurity. Nearly as old as the discipline of cybersecurity itself, it aims to help organizations identify and address potential security issues before they become serious problems. Yet, in recent years, the limitations of this approach have become increasingly evident.  At its core, Vulnerability Management

    Read More

  • Hackers Target Uyghurs and Tibetans with MOONSHINE Exploit and DarkNimbus Backdoor

    Hackers Target Uyghurs and Tibetans with MOONSHINE Exploit and DarkNimbus Backdoor

    A previously undocumented threat activity cluster dubbed Earth Minotaur is leveraging the MOONSHINE exploit kit and an unreported Android-cum-Windows backdoor called DarkNimbus to facilitate long-term surveillance operations targeting Tibetans and Uyghurs. “Earth Minotaur uses MOONSHINE to deliver the DarkNimbus backdoor to Android and Windows devices, targeting WeChat, and possibly making it a

    Read More

  • Cyber Experts Say You Should Use These Best Practices for Event Logging

    Cyber Experts Say You Should Use These Best Practices for Event Logging

    Today’s businesses are no stranger to the word cybersecurity. They are facing a growing wave of cyberattacks. These come from ransomware to sophisticated phishing schemes. How do you stand ahead of these threats? A strong cybersecurity strategy is essential. One crucial component of this strategy is event logging. It’s one that not every business owner…

    Read More