Triple Extortion Ransomware: How to Protect Your Organization? 1:39 PM Ransomware strikes businesses every 11 seconds. The ransomware attack volume is already at record levels, but we’re hearing it’s only gettin... Read More
Weekly Update 328 1:38 PM Presently sponsored by: 1Password, a secure password manager, is building the passwordless experience you deserve. See how passkeys work We ... Read More
Researcher Uncovers Potential Wiretapping Bugs in Google Home Smart Speakers 1:35 PM A security researcher was awarded a bug bounty of $107,500 for identifying security issues in Google Home smart speakers that could be explo... Read More
New Malvertising Campaign via Google Ads Targets Users Searching for Popular Software 1:38 PM Users searching for popular software are being targeted by a new malvertising campaign that abuses Google Ads to serve trojanized variants t... Read More
BitKeep Confirms Cyber Attack, Loses Over $9 Million in Digital Currencies 1:36 PM Decentralized multi-chain crypto wallet BitKeep on Wednesday confirmed a cyberattack that allowed threat actors to distribute fraudulent ver... Read More
Vice Ransomware Group Uses Custom Ransomware with New Encryption Algorithms 1:36 PM Cybersecurity analysts at SentinelOne security firm have recently identified that the Vice Society ransomware gang has switched to custom ra... Read More
PrivateLoader PPI Service Found Distributing Info-Stealing RisePro Malware 1:35 PM The pay-per-install (PPI) malware downloader service known as PrivateLoader is being used to distribute a previously documented information-... Read More
Why Can’t Company Giants Escape Cybersecurity Breaches? 1:37 PM Security breaches have constantly been on a rise in recent times. Just last month, in the course of a week, Uber took its internal communica... Read More
Godfather Android Malware Stealing Login Credentials of Over 400 Bank Users 1:36 PM In recent years, Android users have been experiencing a rise in the incidence of the GodFather banking trojan, mainly targeting European use... Read More
France Fines Microsoft €60 Million for Using Advertising Cookies Without User Consent 1:35 PM France's privacy watchdog has imposed a €60 million ($63.88 million) fine against Microsoft's Ireland subsidiary for dropping advert... Read More
New Zerobot Malware Exploiting Apache Vulnerabilities to Launch DDoS Attack 1:38 PM As a result of the exploitation of security vulnerabilities found on unpatched Apache servers that are exposed to the Internet, the Zerobot ... Read More
Raspberry Robin Malware Attacks Against Telecom and Government Sectors 1:37 PM Trend Micro researchers noticed Raspberry Robin in recent attacks on telecommunications service providers and government networks. The Raspb... Read More
Ransomware Hackers Using New Way to Bypass MS Exchange ProxyNotShell Mitigations 1:37 PM Threat actors affiliated with a ransomware strain known as Play are leveraging a never-before-seen exploit chain that bypasses blocking rule... Read More
KmsdBot Botnet Suspected of Being Used as DDoS-for-Hire Service 1:37 PM An ongoing analysis of the KmsdBot botnet has raised the possibility that it's a DDoS-for-hire service offered to other threat actors. T... Read More
Facebook Cracks Down on Spyware Vendors from U.S., China, Russia, Israel, and India 1:38 PM Meta Platforms disclosed that it took down no less than 200 covert influence operations since 2017 spanning roughly 70 countries across 42 l... Read More
New DDoS Botnet Malware Infecting Windows, Linux, and IoT Devices 1:36 PM A cross-platform botnet, ‘MCCrash’ that starts out from malicious software downloads on Windows devices and spreads to a range of Linux-base... Read More
What happens once scammers receive funds from their victims 1:38 PM In this Help Net Security video, Ronnie Tokazowski, Principal Threat Advisor at Cofense, offers insight into the world’s most lucrative cybe... Read More
Top 12 Best Open Source Intelligence Tools (OSINT Tools) for Penetration Testing 2023 1:37 PM We all know very well that getting or gathering any information by using various tools becomes really easy. In this article, we have discuss... Read More
Google Takes Gmail Security to the Next Level with Client-Side Encryption 1:37 PM Google on Friday announced that its client-side encryption for Gmail is in beta to its Workspace and education customers to secure emails se... Read More
Goodbye SHA-1: NIST Retires 27-Year-Old Widely Used Cryptographic Algorithm 1:37 PM The U.S. National Institute of Standards and Technology (NIST), an agency within the Department of Commerce, announced Thursday that it'... Read More
FBI Charges 6, Seizes 48 Domains Linked to DDoS-for-Hire Service Platforms 1:36 PM The U.S. Department of Justice (DoJ) on Wednesday announced the seizure of 48 domains that offered services to conduct distributed denial-of... Read More
Cybersecurity Experts Uncover Inner Workings of Destructive Azov Ransomware 1:37 PM Cybersecurity researchers have published the inner workings of a new wiper called Azov Ransomware that's deliberately designed to corrup... Read More
Key Cybersecurity Takeaways from 2022 1:36 PM 2022 was a noteworthy year in cybersecurity. We saw a steady rise in cybercrime, continuing the trend from previous years. But we also saw a... Read More
Uber Hacked Again? – Data from Uber and Uber Eats Published on Hacking Forums 1:35 PM Uber has been the subject of a new cyberattack. Early on Saturday morning, a threat actor going by the name of “UberLeaks” began publishing ... Read More
Japan, Australia, to bolster cyber-defenses, maybe offensive capacity too 1:37 PM FTX Japan payment promise evaporates; VR/AR to boom across APAC; Google wins privacy case Asia In Brief Australia’s home affairs and cybers... Read More
Red Team and Blue Team Operations : How Does it Works? 1:36 PM Security is a multifaceted field with multiple roles for carrying out diverse operations. In this article, we demystify the concept of the r... Read More
Hack-for-Hire Group Targets Travel and Financial Entities with New Janicab Malware Variant 1:36 PM Travel agencies have emerged as the target of a hack-for-hire group dubbed Evilnum as part of a broader campaign aimed at legal and financia... Read More
New MuddyWater Campaign Uses Legitimate Remote Administration Tools to Deploy Malware 1:35 PM Deep Instinct identified a new MuddyWater threat campaign active since at least 2017, and frequently conducts campaigns against high-value t... Read More
New Dark Web Website Allows Hackers to Embed Malware to Legitimate Android Apps 1:38 PM ThreatFabric’s researchers found ‘Zombinder’, a third-party darknet service that was used to bind malware payloads to legitimate Android app... Read More
Kali Linux 2022.4 Released With New Hacking Tools & Azure Images 1:35 PM The most recent Kali Linux release for 2022, Kali Linux 2022.4, from Offensive Security includes updated desktop experiences, new Azure and ... Read More
Microsoft Alerts Cryptocurrency Industry of Targeted Cyberattacks 1:36 PM Cryptocurrency investment companies are the target of a developing threat cluster that uses Telegram groups to seek out potential victims. M... Read More
Darknet's Largest Mobile Malware Marketplace Threatens Users Worldwide 1:37 PM Cybersecurity researchers have shed light on a darknet marketplace called InTheBox that's designed to specifically cater to mobile malwa... Read More
Understanding NIST CSF to assess your organization's Ransomware readiness 1:37 PM Ransomware attacks keep increasing in volume and impact largely due to organizations' weak security controls. Mid-market companies are t... Read More
Telcom and BPO Companies Under Attack by SIM Swapping Hackers 1:36 PM A persistent intrusion campaign has set its eyes on telecommunications and business process outsourcing (BPO) companies at lease since June ... Read More
Critical Ping Vulnerability Allows Remote Attackers to Take Over FreeBSD Systems 2:32 PM The maintainers of the FreeBSD operating system have released updates to remediate a security vulnerability impacting the ping module that c... Read More
BlackProxies – A Criminal Proxy Services Selling a Million Access to Hackers 1:35 PM DomainTools analysts have recently spotted a new residential proxy market which is dubbed “BlackProxies” that is aggressively gaining huge p... Read More
Better together: Offsetting cybersecurity’s labor challenges with API integrations 1:38 PM To offset cybersecurity labor challenges, adopt security tools and platforms with a deep library of API and third-party integrations. This a... Read More
10 Best Bot Protection Software – 2023 1:37 PM Bot protection software or bot mitigation software plays a vital role in protecting websites and web apps from malicious traffic. A ‘bot’ (s... Read More
Critical RCE Flaw With 2M Downloaded Android Remote Keyboard Apps Let Attackers Access keystrokes 1:36 PM Multiple critical vulnerabilities were found by the security researchers at Synopsys in three Android apps that enable users to control comp... Read More
New Flaw in Acer Laptops Let Attackers Disable Boot Protection 1:36 PM Experts from Acer observed multiple Acer laptop models have vulnerabilities that might let hackers disable the ‘Secure Boot’ function and se... Read More