• FBI Creates Fake Cryptocurrency to Expose Widespread Crypto Market Manipulation

    FBI Creates Fake Cryptocurrency to Expose Widespread Crypto Market Manipulation

    The U.S. Department of Justice (DoJ) has announced arrests and charges against several individuals and entities in connection with allegedly manipulating digital asset markets as part of a widespread fraud operation. The law enforcement action – codenamed Operation Token Mirrors – is the result of the U.S. Federal Bureau of Investigation (FBI) taking the “unprecedented…

    Read More

  • GitHub, Telegram Bots, and QR Codes Abused in New Wave of Phishing Attacks

    GitHub, Telegram Bots, and QR Codes Abused in New Wave of Phishing Attacks

    A new tax-themed malware campaign targeting insurance and finance sectors has been observed leveraging GitHub links in phishing email messages as a way to bypass security measures and deliver Remcos RAT, indicating that the method is gaining traction among threat actors. “In this campaign, legitimate repositories such as the open-source tax filing software, UsTaxes, HMRC,…

    Read More

  • How Hybrid Password Attacks Work and How to Defend Against Them

    How Hybrid Password Attacks Work and How to Defend Against Them

    Threat actors constantly change tactics to bypass cybersecurity measures, developing innovative methods to steal user credentials. Hybrid password attacks merge multiple cracking techniques to amplify their effectiveness. These combined approaches exploit the strengths of various methods, accelerating the password-cracking process.  In this post, we’ll explore hybrid attacks — what they are

    Read More

  • CISA Warns of Threat Actors Exploiting F5 BIG-IP Cookies for Network Reconnaissance

    CISA Warns of Threat Actors Exploiting F5 BIG-IP Cookies for Network Reconnaissance

    The U.S. Cybersecurity and Infrastructure Security Agency (CISA) is warning that it has observed threat actors leveraging unencrypted persistent cookies managed by the F5 BIG-IP Local Traffic Manager (LTM) module to conduct reconnaissance of target networks. It said the module is being used to enumerate other non-internet-facing devices on the network. The agency, however, did…

    Read More

  • New Critical GitLab Vulnerability Could Allow Arbitrary CI/CD Pipeline Execution

    New Critical GitLab Vulnerability Could Allow Arbitrary CI/CD Pipeline Execution

    GitLab has released security updates for Community Edition (CE) and Enterprise Edition (EE) to address eight security flaws, including a critical bug that could allow running Continuous Integration and Continuous Delivery (CI/CD) pipelines on arbitrary branches. Tracked as CVE-2024-9164, the vulnerability carries a CVSS score of 9.6 out of 10. “An issue was discovered in…

    Read More

  • Bohemia and Cannabia Dark Web Markets Taken Down After Joint Police Operation

    Bohemia and Cannabia Dark Web Markets Taken Down After Joint Police Operation

    The Dutch police have announced the takedown of Bohemia and Cannabia, which has been described as the world’s largest and longest-running dark web market for illegal goods, drugs, and cybercrime services. The takedown is the result of a collaborative investigation with Ireland, the United Kingdom, and the United States that began towards the end of…

    Read More

  • Google Joins Forces with GASA and DNS RF to Tackle Online Scams at Scale

    Google Joins Forces with GASA and DNS RF to Tackle Online Scams at Scale

    Google on Wednesday announced a new partnership with the Global Anti-Scam Alliance (GASA) and DNS Research Federation (DNS RF) to combat online scams. The initiative, which has been codenamed the Global Signal Exchange (GSE), is designed to create real-time insights into scams, fraud, and other forms of cybercrime pooling together threat signals from different data…

    Read More

  • Researchers Uncover Major Security Vulnerabilities in Industrial MMS Protocol Libraries

    Researchers Uncover Major Security Vulnerabilities in Industrial MMS Protocol Libraries

    Details have emerged about multiple security vulnerabilities in two implementations of the Manufacturing Message Specification (MMS) protocol that, if successfully exploited, could have severe impacts in industrial environments. “The vulnerabilities could allow an attacker to crash an industrial device or in some cases, enable remote code execution,” Claroty researchers Mashav Sapir and Vera

    Read More

  • N. Korean Hackers Use Fake Interviews to Infect Developers with Cross-Platform Malware

    N. Korean Hackers Use Fake Interviews to Infect Developers with Cross-Platform Malware

    Threat actors with ties to North Korea have been observed targeting job seekers in the tech industry to deliver updated versions of known malware families tracked as BeaverTail and InvisibleFerret. The activity cluster, tracked as CL-STA-0240, is part of a campaign dubbed Contagious Interview that Palo Alto Networks Unit 42 first disclosed in November 2023.…

    Read More

  • Social Media Accounts: The Weak Link in Organizational SaaS Security

    Social Media Accounts: The Weak Link in Organizational SaaS Security

    Social media accounts help shape a brand’s identity and reputation. These public forums engage directly with customers as they are a hub to connect, share content and answer questions. However, despite the high profile role these accounts have, many organizations overlook social media account security. Many lack the safeguards to prevent unauthorized access — a…

    Read More