• 5 Scattered Spider Gang Members Indicted in Multi-Million Dollar Cybercrime Scheme

    5 Scattered Spider Gang Members Indicted in Multi-Million Dollar Cybercrime Scheme

    Five alleged members of the infamous Scattered Spider cybercrime crew have been indicted in the U.S. for targeting employees of companies across the country using social engineering techniques to harvest credentials and using them to gain unauthorized access to sensitive data and break into crypto accounts to steal digital assets worth millions of dollars. All…

    Read More

  • Google’s AI-Powered OSS-Fuzz Tool Finds 26 Vulnerabilities in Open-Source Projects

    Google’s AI-Powered OSS-Fuzz Tool Finds 26 Vulnerabilities in Open-Source Projects

    Google has revealed that its AI-powered fuzzing tool, OSS-Fuzz, has been used to help identify 26 vulnerabilities in various open-source code repositories, including a medium-severity flaw in the OpenSSL cryptographic library. “These particular vulnerabilities represent a milestone for automated vulnerability finding: each was found with AI, using AI-generated and enhanced fuzz targets,”

    Read More

  • NodeStealer Malware Targets Facebook Ad Accounts, Harvesting Credit Card Data

    NodeStealer Malware Targets Facebook Ad Accounts, Harvesting Credit Card Data

    Threat hunters are warning about an updated version of the Python-based NodeStealer that’s now equipped to extract more information from victims’ Facebook Ads Manager accounts and harvest credit card data stored in web browsers. “They collect budget details of Facebook Ads Manager accounts of their victims, which might be a gateway for Facebook malvertisement,” Netskope…

    Read More

  • Ghost Tap: Hackers Exploiting NFCGate to Steal Funds via Mobile Payments

    Ghost Tap: Hackers Exploiting NFCGate to Steal Funds via Mobile Payments

    Threat actors are increasingly banking on a new technique that leverages near-field communication (NFC) to cash out victim’s funds at scale. The technique, codenamed Ghost Tap by ThreatFabric, enables cybercriminals to cash-out money from stolen credit cards linked to mobile payment services such as Google Pay or Apple Pay and relaying NFC traffic. “Criminals can…

    Read More

  • NHIs Are the Future of Cybersecurity: Meet NHIDR

    NHIs Are the Future of Cybersecurity: Meet NHIDR

    The frequency and sophistication of modern cyberattacks are surging, making it increasingly challenging for organizations to protect sensitive data and critical infrastructure. When attackers compromise a non-human identity (NHI), they can swiftly exploit it to move laterally across systems, identifying vulnerabilities and compromising additional NHIs in minutes. While organizations often take

    Read More

  • Ngioweb Botnet Fuels NSOCKS Residential Proxy Network Exploiting IoT Devices

    Ngioweb Botnet Fuels NSOCKS Residential Proxy Network Exploiting IoT Devices

    The malware known as Ngioweb has been used to fuel a notorious residential proxy service called NSOCKS, as well as by other services such as VN5Socks and Shopsocks5, new findings from Lumen Technologies reveal. “At least 80% of NSOCKS bots in our telemetry originate from the Ngioweb botnet, mainly utilizing small office/home office (SOHO) routers…

    Read More

  • Hackers Hijack Unsecured Jupyter Notebooks to Stream Illegal Sports Broadcasts

    Hackers Hijack Unsecured Jupyter Notebooks to Stream Illegal Sports Broadcasts

    Malicious actors are exploiting misconfigured JupyterLab and Jupyter Notebooks to conduct stream ripping and enable sports piracy using live streaming capture tools. The attacks involve the hijack of unauthenticated Jupyter Notebooks to establish initial access, and perform a series of actions designed to facilitate illegal live streaming of sports events, Aqua said in a report…

    Read More

  • Privileged Accounts, Hidden Threats: Why Privileged Access Security Must Be a Top Priority

    Privileged Accounts, Hidden Threats: Why Privileged Access Security Must Be a Top Priority

    Privileged accounts are well-known gateways for potential security threats. However, many organizations focus solely on managing privileged access—rather than securing the accounts and users entrusted with it. This emphasis is perhaps due to the persistent challenges of Privileged Access Management (PAM) deployments. Yet, as the threat landscape evolves, so must organizational priorities. To

    Read More

  • Commentary: Wings on the River

    Commentary: Wings on the River

    Politics of birding

    Read More

  • New ‘Helldown’ Ransomware Variant Expands Attacks to VMware and Linux Systems

    New ‘Helldown’ Ransomware Variant Expands Attacks to VMware and Linux Systems

    Cybersecurity researchers have shed light on a Linux variant of a relatively new ransomware strain called Helldown, suggesting that the threat actors are broadening their attack focus. “Helldown deploys Windows ransomware derived from the LockBit 3.0 code,” Sekoia said in a report shared with The Hacker News. “Given the recent development of ransomware targeting ESX,…

    Read More