• Top 3 Threat Report Insights for Q2 2024

    Top 3 Threat Report Insights for Q2 2024

    Cato CTRL (Cyber Threats Research Lab) has released its Q2 2024 Cato CTRL SASE Threat Report. The report highlights critical findings based on the analysis of a staggering 1.38 trillion network flows from more than 2,500 of Cato’s global customers, between April and June 2024. Key Insights from the Q2 2024 Cato CTRL SASE Threat…

    Read More

  • Quad7 Botnet Expands to Target SOHO Routers and VPN Appliances

    Quad7 Botnet Expands to Target SOHO Routers and VPN Appliances

    The operators of the mysterious Quad7 botnet are actively evolving by compromising several brands of SOHO routers and VPN appliances by leveraging a combination of both known and unknown security flaws. Targets include devices from TP-LINK, Zyxel, Asus, Axentra, D-Link, and NETGEAR, according to a new report by French cybersecurity company Sekoia. “The Quad7 botnet…

    Read More

  • DragonRank Black Hat SEO Campaign Targeting IIS Servers Across Asia and Europe

    DragonRank Black Hat SEO Campaign Targeting IIS Servers Across Asia and Europe

    A “simplified Chinese-speaking actor” has been linked to a new campaign that has targeted multiple countries in Asia and Europe with the end goal of performing search engine optimization (SEO) rank manipulation. The black hat SEO cluster has been codenamed DragonRank by Cisco Talos, with victimology footprint scattered across Thailand, India, Korea, Belgium, the Netherlands,…

    Read More

  • Singapore Police Arrest Six Hackers Linked to Global Cybercrime Syndicate

    Singapore Police Arrest Six Hackers Linked to Global Cybercrime Syndicate

    The Singapore Police Force (SPF) has announced the arrest of five Chinese nationals and one Singaporean man for their alleged involvement in illicit cyber activities in the country. The development comes after a group of about 160 law enforcement officials conducted a series of raids on September 9, 2024, simultaneously at several locations. The six…

    Read More

  • Why Is It So Challenging to Go Passwordless?

    Why Is It So Challenging to Go Passwordless?

    Imagine a world where you never have to remember another password. Seems like a dream come true for both end users and IT teams, right? But as the old saying goes, “If it sounds too good to be true, it probably is.”  If your organization is like many, you may be contemplating a move to…

    Read More

  • Developers Beware: Lazarus Group Uses Fake Coding Tests to Spread Malware

    Developers Beware: Lazarus Group Uses Fake Coding Tests to Spread Malware

    Cybersecurity researchers have uncovered a new set of malicious Python packages that target software developers under the guise of coding assessments. “The new samples were tracked to GitHub projects that have been linked to previous, targeted attacks in which developers are lured using fake job interviews,” ReversingLabs researcher Karlo Zanki said. The activity has been…

    Read More

  • CosmicBeetle Deploys Custom ScRansom Ransomware, Partnering with RansomHub

    CosmicBeetle Deploys Custom ScRansom Ransomware, Partnering with RansomHub

    The threat actor known as CosmicBeetle has debuted a new custom ransomware strain called ScRansom in attacks targeting small- and medium-sized businesses (SMBs) in Europe, Asia, Africa, and South America, while also likely working as an affiliate for RansomHub. “CosmicBeetle replaced its previously deployed ransomware, Scarab, with ScRansom, which is continually improved,” ESET researcher Jakub

    Read More

  • Experts Identify 3 Chinese-Linked Clusters Behind Cyberattacks in Southeast Asia

    Experts Identify 3 Chinese-Linked Clusters Behind Cyberattacks in Southeast Asia

    A trio of threat activity clusters linked to China has been observed compromising more government organizations in Southeast Asia as part of a renewed state-sponsored operation codenamed Crimson Palace, indicating an expansion in the scope of the espionage effort. Cybersecurity firm Sophos, which has been monitoring the cyber offensive, said it comprises three intrusion sets…

    Read More

  • Shining a Light on Shadow Apps: The Invisible Gateway to SaaS Data Breaches

    Shining a Light on Shadow Apps: The Invisible Gateway to SaaS Data Breaches

    Shadow apps, a segment of Shadow IT, are SaaS applications purchased without the knowledge of the security team. While these applications may be legitimate, they operate within the blind spots of the corporate security team and expose the company to attackers.  Shadow apps may include instances of software that the company is already using. For…

    Read More

  • New PIXHELL Attack Exploits Screen Noise to Exfiltrates Data from Air-Gapped Computers

    New PIXHELL Attack Exploits Screen Noise to Exfiltrates Data from Air-Gapped Computers

    A new side-channel attack dubbed PIXHELL could be abused to target air-gapped computers by breaching the “audio gap” and exfiltrating sensitive information by taking advantage of the noise generated by the pixels on the screen. “Malware in the air-gap and audio-gap computers generates crafted pixel patterns that produce noise in the frequency range of 0…

    Read More