• Ex-Engineer Charged in Missouri for Failed $750,000 Bitcoin Extortion Attempt

    Ex-Engineer Charged in Missouri for Failed $750,000 Bitcoin Extortion Attempt

    A 57-year-old man from the U.S. state of Missouri has been arrested in connection with a failed data extortion campaign that targeted his former employer. Daniel Rhyne of Kansas City, Missouri, has been charged with one count of extortion in relation to a threat to cause damage to a protected computer, one count of intentional…

    Read More

  • RansomHub Ransomware Group Targets 210 Victims Across Critical Sectors

    RansomHub Ransomware Group Targets 210 Victims Across Critical Sectors

    Threat actors linked to the RansomHub ransomware group encrypted and exfiltrated data from at least 210 victims since its inception in February 2024, the U.S. government said. The victims span various sectors, including water and wastewater, information technology, government services and facilities, healthcare and public health, emergency services, food and agriculture, financial services,

    Read More

  • Webinar: Learn to Boost Cybersecurity with AI-Powered Vulnerability Management

    Webinar: Learn to Boost Cybersecurity with AI-Powered Vulnerability Management

    The world of cybersecurity is in a constant state of flux. New vulnerabilities emerge daily, and attackers are becoming more sophisticated. In this high-stakes game, security leaders need every advantage they can get. That’s where Artificial Intelligence (AI) comes in. AI isn’t just a buzzword; it’s a game-changer for vulnerability management. AI is poised to…

    Read More

  • Next-Generation Attacks, Same Targets – How to Protect Your Users’ Identities

    Next-Generation Attacks, Same Targets – How to Protect Your Users’ Identities

    The FBI and CISA Issue Joint Advisory on New Threats and How to Stop Ransomware Note: on August 29, the FBI and CISA issued a joint advisory as part of their ongoing #StopRansomware effort to help organizations protect against ransomware. The latest advisory, AA24-242A, describes a new cybercriminal group and its attack methods. It also…

    Read More

  • Malicious npm Packages Mimicking ‘noblox.js’ Compromise Roblox Developers’ Systems

    Malicious npm Packages Mimicking ‘noblox.js’ Compromise Roblox Developers’ Systems

    Roblox developers are the target of a persistent campaign that seeks to compromise systems through bogus npm packages, once again underscoring how threat actors continue to exploit the trust in the open-source ecosystem to deliver malware. “By mimicking the popular ‘noblox.js’ library, attackers have published dozens of packages designed to steal sensitive data and compromise…

    Read More

  • North Korean Hackers Deploy FudModule Rootkit via Chrome Zero-Day Exploit

    North Korean Hackers Deploy FudModule Rootkit via Chrome Zero-Day Exploit

    A recently patched security flaw in Google Chrome and other Chromium web browsers was exploited as a zero-day by North Korean actors in a campaign designed to deliver the FudModule rootkit. The development is indicative of the persistent efforts made by the nation-state adversary, which had made a habit of incorporating rafts of Windows zero-day…

    Read More

  • Cyberattackers Exploit Google Sheets for Malware Control in Likely Espionage Campaign

    Cyberattackers Exploit Google Sheets for Malware Control in Likely Espionage Campaign

    Cybersecurity researchers have uncovered a novel malware campaign that leverages Google Sheets as a command-and-control (C2) mechanism. The activity, detected by Proofpoint starting August 5, 2024, impersonates tax authorities from governments in Europe, Asia, and the U.S., with the goal of targeting over 70 organizations worldwide by means of a bespoke tool called Voldemort that’s…

    Read More

  • Iranian Hackers Set Up New Network to Target U.S. Political Campaigns

    Iranian Hackers Set Up New Network to Target U.S. Political Campaigns

    Cybersecurity researchers have unearthed new network infrastructure set up by Iranian threat actors to support activities linked to the recent targeting of U.S. political campaigns. Recorded Future’s Insikt Group has linked the infrastructure to a threat it tracks as GreenCharlie, an Iran-nexus cyber threat group that overlaps with APT42, Charming Kitten, Damselfly, Mint Sandstorm (formerly

    Read More

  • Breaking Down AD CS Vulnerabilities: Insights for InfoSec Professionals

    Breaking Down AD CS Vulnerabilities: Insights for InfoSec Professionals

    The most dangerous vulnerability you’ve never heard of. In the world of cybersecurity, vulnerabilities are discovered so often, and at such a high rate, that it can be very difficult to keep up with. Some vulnerabilities will start ringing alarm bells within your security tooling, while others are far more nuanced, but still pose an…

    Read More

  • New Malware Masquerades as Palo Alto VPN Targeting Middle East Users

    New Malware Masquerades as Palo Alto VPN Targeting Middle East Users

    Cybersecurity researchers have disclosed a new campaign that potentially targets users in the Middle East through malware that disguises itself as Palo Alto Networks GlobalProtect virtual private network (VPN) tool. “The malware can execute remote PowerShell commands, download and exfiltrate files, encrypt communications, and bypass sandbox solutions, representing a significant threat to

    Read More