

Security Affairs
Experts devised attack technique to extract ChatGPT training data
Researchers devised an attack technique that could have been used to trick ChatGPT into disclosing training data.
Security Affairs
Researchers devised an attack technique that could have been used to trick ChatGPT into disclosing training data.
Cyber Security News
Researchers at Google recently developed and unveiled a new resilient and efficient text vectorizer dubbed as "RETVec,".
The Hacker News
A mysterious malware called Agent Racoon is infiltrating organizations in the Middle East, Africa, and the U.S.
Bleeping Computer
A novel malware named 'Agent Raccoon' (or Agent Racoon) is being used in cyberattacks against organizations in the United States, the Middle East, and Africa.
The Cyber Wire
Russian disinformation seeks to reach anglophone audiences, and makes some claims that would be too far-fetched to get past a science-fiction editor.
The Hacker News
DOJ and FBI dismantle Qakbot malware and botnet, but is the threat really gone? Find out the aftermath and mitigation strategies.
The Hacker News
Chinese-speaking threat actor targeting Uzbekistan Ministry of Foreign Affairs and South Korean users with dangerous SugarGh0st RAT.
The Hacker News
Gcore's customer faced two massive DDoS attacks peaking at 1.1 and 1.6 Tbps. Discover the attacker's strategies and how Gcore defended against them.
The Hacker News
Zyxel released patches for 15 security issues in NAS, firewall, and AP devices. Includes 3 critical flaws allowing authentication bypass and comman
The Record
Air Force Lt. Gen. Timothy Haugh was already subject to a long-running blockade of nominations in the Senate. Now Sen. Ron Wyden is holding it up as leverage to get more information about the NSA's potential connections with the data broker industry.
The Record
There should be “a European cyber force … equipped with offensive capabilities,” according to the president of the European Council, which sets the EU's political priorities.
The Record
The Ukrainian government has appointed Yury Myronenko, a decorated serviceman and air defense commander, as head of one of its main cybersecurity agencies amid a corruption probe.
The Record
The ransomware attack targeted the cloud services provider Ongoing Operations, a company owned by credit union technology firm Trellance.
The Record
A cyberespionage group known as XDSpy recently targeted Russian military-industrial enterprises, according to new research.
Bleeping Computer
Cactus ransomware has been exploiting critical vulnerabilities in the Qlik Sense data analytics solution to get initial access on corporate networks.
Ars Technica
Examining 365 days with OpenAI's bot: The good, the bad, the ugly—and the productive?
SecurityWeek
Zyxel patches at least 15 security flaws that expose users to authentication bypass, command injection and denial-of-service attacks.
Bleeping Computer
Zyxel has addressed multiple security issues, including three critical ones that could allow an unauthenticated attacker to execute operating system commands on vulnerable network-attached storage (NAS) devices.
Ars Technica
China's flagship smartphone maker pulled off the feat despite sanctions.
Infosecurity News
The new ScrubCrypt obfuscation tool is designed to avoid antivirus protections
The Cyber Wire
NATO conducts its annual cyber exercise against a background of hybrid war, heightened cyber espionage, and increased activity on the part of hacktivist auxiliaries.
Cyber Security News
cybercriminals employ ever more sophisticated forms of malware, with code obfuscation standing out as a deceptive technique.
SecurityWeek
Zimperium has identified over 200 information-stealing Android applications targeting mobile banking users in Iran.
HACKRead
The recently discovered GoTitan botnet is built on the Golang programming language, whereas PrCtrl Rat is a .NET program.
Ars Technica
Goldman Sachs has lost billions of dollars on its consumer-focused businesses.
Cyber Security News
Attackers are exploiting the recently discovered critical security vulnerability tracked as (CVE-2023-46604) affecting Apache ActiveMQ.
CyberNews
Merriam-Webster, a publishing company known for its dictionaries, has chosen “authentic” as its word of the year, highlighting the impact of the rise of AI.
Cyber Security News
Trend Micro Managed XDR team has uncovered a malevolent symphony echoing the tactics employed by the infamous Genesis Market.
CyberSecurity Dive
The suspected ransomware attack against Fidelity National Financial marks the latest in a series of incidents, leading regulators to take additional enforcement actions.
The Hacker News
A new report reveals an ongoing Android malware campaign targeting Iranian banks with over 200 malicious apps.
The Cyber Express
Infamous Play ransomware group has extended its list of victims by adding 17 new names of companies based in the
Computerworld
While incognito mode in any of the big four web browsers offers a measure of privacy, it doesn’t completely hide your tracks online. Here’s how the feature works in each browser, and how to use it.
The Hacker News
Beware of Xaro! This DJVU ransomware variant spreads through cracked software, endangering users who download from untrusted sources.
The Hacker News
🚨 Apache ActiveMQ's CVE-2023-46604 vulnerability is under active exploitation by threat actors, leading to the distribution of a new Go-based botnet
Bleeping Computer
Today, Microsoft shared a temporary fix for a known issue causing Outlook Desktop to crash when sending emails from Outlook.com accounts.
The Cyber Wire
Storms impede ground operations. Smartphones as intelligence sources (and as a security problem). Notes on hacktivist auxiliaries, both Russian and Ukrainian.
Bleeping Computer
In cooperation with Europol and Eurojust, law enforcement agencies from seven nations have arrested in Ukraine the core members of a ransomware group linked to attacks against organizations in 71 countries.
CyberNews
Meta’ paid no-ads subscription service launched in Europe this month faces a test as advocacy group NOYB on Tuesday filed a complaint with an Austrian regulator.
CSO
Threat actors are combining RustBucket loader with KandyKorn payload to effect an evasive and persistent RAT attack.
The Record
The international operation, centered on Kyiv, essentially neutralized a group known for deploying variants of LockerGoga, MegaCortex, Hive and Dharma ransomware, authorities said.
The Hacker News
Cyber Monday Alert: $13.7 billion in spending today! Retailers, safeguard your SaaS apps to protect customer data.
Infosecurity News
CPR said the malware now uses OneDrive instead of Google Drive for storing dynamic C2 server URLs
SecurityWeek
UK and Korea say DPRK state-sponsored hackers targeted governments, defense organizations via supply chain attacks.
CyberNews
Line app has informed users about unauthorized access to its systems, which resulted in hundreds of thousands of user, business partner, and employee records being leaked.
Cyber Security News
SysJoker malware, a multi-platform backdoor with several variants for Windows, Linux, and Mac, has been observed being used by a Hamas-affiliated APT to target Israel. This malware was first identified by Intezer in 2021 and was recently used in targeted attacks. Checkpoint researchers disclosed the malware’s growth, variations in the intricacy of its execution flow, and […]
Cyber Security News
Loader malware emerges as a silent force, discreetly breaching unsuspecting systems and setting the stage for more sophisticated onslaughts.
SecurityWeek
The U.S. military is increasing use of artificial intelligence (AI) technology that will fundamentally alter the nature of war.
Bleeping Computer
A new version of the multi-platform malware known as 'SysJoker' has been spotted, featuring a complete code rewrite in the Rust programming language.
Cyber Security News
Oryxlabs recently launched a free DNS server that is written in Python 3.x for vulnerability research and pentesting, dubbed as "PolarDNS."
Cyber Security News
Ducktail is a specifically designed information stealer that can have severe consequences, such as privacy breaches and identity theft.
Security Affairs
Researchers reported that a Hamas-linked APT group is using a rust-based SysJoker backdoor against Israeli entities.
Bleeping Computer
A joint advisory by the National Cyber Security Centre (NCSC) and Korea's National Intelligence Service (NIS) discloses a supply-chain attack executed by North Korean hackers involving the MagicLineThe National Cyber Security Centre (NCSC) and Korea's National Intelligence Service (NIS) warn that the North Korean Lazarus hacking grou
The Hacker News
GitGuardian launches "HasMySecretLeaked" service to help developers check if their sensitive information has been exposed on GitHub.
The Hacker News
Researchers found a Rust version of SysJoker, a cross-platform backdoor used by Hamas-affiliated threat actor targeting Israel during ongoing conflict
Security Affairs
North Korea-linked Konni APT group used Russian-language Microsoft Word documents to deliver malware .............
Security Affairs
Threat actors spread Atomic Stealer (AMOS) macOS information stealer via a bogus web browser update as part of ClearFake campaign.
Infosecurity News
The investigation conducted by Akamai in late October 2023 revealed a specific HTTP exploit path
The Hacker News
New Malware Alert: WailingCrab, a sophisticated loader, is spreading via shipping-themed email messages.
Infosecurity News
The UK’s NCSC and South Korea’s NIS issued a joint advisory describing some of North Korean hackers’ tactics in deploying supply chain attacks
Infosecurity News
University of Manchester CISO Heather Lowrie shared how the institution tackled a major data breach earlier in 2023
The Hacker News
Active malware campaign exploits zero-day vulnerabilities to create a Mirai-based DDoS botnet targeting routers and NVR devices.
Infosecurity News
Legitimate app installer modified with malicious code
The Hacker News
North Korean hackers, aka Diamond Sleet, spread a trojanized version of CyberLink's legit app.
CyberNews
Feam Aero, the global aircraft maintenance and technical services company, has been claimed by the LockBit ransomware gang.
Trend Micro
We detail the modular framework of malicious Chrome extensions that consist of various highly obfuscated components that leverage Google Chrome API to monitor, intercept, and exfiltrate victim data.
Security Affairs
Mirai-based botnet InfectedSlurs has been spotted exploiting two zero-day RCE flaws to compromise routers and video recorder (NVR) devices.
DarkReading
A pervasive ClearFake campaign targeting Windows systems with Atomic Stealer has expanded its social engineering scams to MacOS users, analysts warn.
Ars Technica
Internet scans show 7,000 devices may be vulnerable. The true number could be higher.
Bleeping Computer
Microsoft says a North Korean hacking group has breached Taiwanese multimedia software company CyberLink and trojanized one of its installers to push malware in a supply chain attack targeting potential victims worldwide.
Bleeping Computer
A new Mirai-based malware botnet named 'InfectedSlurs' has been exploiting two zero-day remote code execution (RCE) vulnerabilities to infect routers and video recorder (NVR) devices.
SecurityWeek
Researchers say public exposure of Kubernetes configuration secrets should be considered a “ticking supply chain attack bomb.”
CSO
Nearly all of them still have a long way to go according to a new Cisco report.
Infosecurity News
Cybersecurity challenges facing the space sector are unique and securing the supply chain is a high priority
CyberNews
Gas station pump controllers could become vital targets in a cyber war.
Cyber Security News
The Mirai botnet is a malicious network of infected computers, routers, and IoT devices harnessed by cybercriminals to launch large-scale DDoS attacks.
Infosecurity News
New unit will scour the internet for evidence
The Hacker News
macOS users beware! Atomic Stealer, a $1,000/month malware, is now spreading through deceptive web browser updates via ClearFake.
Ars Technica
LitterDrifter's means of self-propagation are simple. So why is it spreading so widely?
Trend Micro
The Trend Micro Managed XDR team encountered malicious operations that used techniques similar to the ones used by Genesis Market, a website for facilitating fraud that was taken down in April 2023.
Infosecurity News
Microsoft highlighted a shift in tactics, with attackers directly sharing malicious APK files
Infosecurity News
Fortinet researchers have detected a malicious Word document displaying Russian text
Bleeping Computer
A sophisticated phishing campaign pushing the DarkGate malware infections has recently added the PikaBot malware into the mix, making it the most advanced phishing campaign since the Qakbot operation was dismantled.
SecurityWeek
Lasso Security raises $6 million in seed funding to tackle cyber threats to secure generative AI and large language model algorithms.
Bleeping Computer
Malwarebytes' is running a Black Friday 2023 deal now through Cyber Monday, offering a 50% discount to the Malwarebytes Premium + Privacy VPN bundle until November 30th.
The Hacker News
New variant of Agent Tesla malware identified. It's a keylogger and remote access trojan (RAT) offered as part of a malware-as-a-service (MaaS) model.
The Hacker News
Phishing attacks are getting smarter! Cybercriminals are now using QR codes, CAPTCHAs, and steganography to trick victims. Learn how to stay safe.
The Hacker News
📱 Alert: Android users in India, beware! Hackers are distributing fake banking and government apps to steal sensitive data like bank info and persona
The Hacker News
China-linked Mustang Panda cyber actor targets Philippines government entity amid South China Sea tensions.
CyberNews
Two heads of Ukraine’s national cybersecurity agency were fired Monday amid accusations of participating in an embezzlement scheme involving millions in state funds.
Bleeping Computer
A recently discovered worm that researchers call LittleDrifter has been spreading over USB drives infecting systems in multiple countries as part of a campaign from the Gamaredon state-sponsored espionage group.
DarkReading
China pairs cyber and kinetic attacks in the South Pacific as it continues to wrangle control of the South China Sea.
Bleeping Computer
A new Phobos ransomware variant frames the popular VX-Underground malware-sharing collective, indicating the group is behind attacks using the encryptor.
CyberNews
The British Library confirms data has been leaked as it struggles to recover from a November 6 ransomware attack claimed by the e Rhysida ransom gang.
The Hacker News
Education, government, and businesses are under attack by NetSupport RAT, a dangerous remote access trojan.
SecurityWeek
New CISA guidance details cyber threats and risks to healthcare and public health organizations and recommends mitigations.
The Hacker News
Silverfort's Unified Identity Protection Platform: A game-changer in cybersecurity. Discover how it protects organizations from identity-based attacks
Bleeping Computer
The Lumma information-stealing malware is now using an interesting tactic to evade detection by security software - the measuring of mouse movements using trigonometry to determine if the malware is running on a real machine or an antivirus sandbox.
Cyber Security News
Gamaredon (aka Primitive Bear, ACTINIUM, and Shuckworm), stands out in Russian espionage by exclusively targeting Ukrainian entities.
SecurityWeek
Russian Gamaredon’s self-propagating LitterDrifter USB worm spreads from Ukraine to the US and other countries.
Security Affairs
The DarkCasino APT group leveraged a recently disclosed WinRAR zero-day vulnerability tracked as CVE-2023-38831.
The Hacker News
Indian Hack-for-Hire Group targeted U.S., China, Pakistan, and more for over a decade.
Trend Micro
We uncovered the active exploitation of the Apache ActiveMQ vulnerability CVE-2023-46604 to download and infect Linux systems with the Kinsing malware (also known as h2miner) and cryptocurrency miner.
Bleeping Computer
After Sandworm and APT28 (known as Fancy Bear), another state-sponsored Russian hacker group, APT29, is leveraging the CVE-2023-38831 vulnerability in WinRAR for cyberattacks.
Security Affairs
A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from Security Affairs are free for you.
Cyber Security News
Welcome to the Cyber Security News Recap, a weekly publication by Cyber Writes. Our aim is to bring you up-to-date information on the latest developments in the field of cybersecurity.
Ars Technica
SIM swaps and port-out scams are a fact of life. New rules aren't likely to change that.
Security Affairs
Russia-linked cyberespionage group Gamaredon has been spotted propagating a worm called LitterDrifter via USB.
The Hacker News
Russian cyber espionage group linked to the FSB are using a USB worm called LitterDrifter to target Ukrainian organizations.
DarkReading
For several years operators at New Delhi-based Appin hacked into, spied on, and stole data from targets around the world for clients that included private investigators, government agencies, law enforcement, and others.
Computerworld
Microsoft's Patch Tuesday release for November delivers 63 updates, with three zero-day flaws affecting Windows and Office. That makes quick patching a must.
SecurityWeek
Bug hunters uncover over a dozen exploitable vulnerabilities in tools used to build chatbots and other types of AI/ML models.
Bleeping Computer
The U.S. Cybersecurity & Infrastructure Security Agency has added to its catalog of known exploited vulnerabilities (KEV) three security issues that affect Microsoft devices, a Sophos product, and an enterprise solution from Oracle.
SecurityWeek
Researchers uncover the activities of Appin, a hack-for-hire Indian firm involved in espionage, surveillance, and disruptive attacks.
SecurityWeek
A Key GOP lawmaker has called for the renewal of surveillance tool as he proposes changes to protect privacy
Cyber Security News
Recently, the FBI and CISA issued a joint Cybersecurity Advisory (CSA) on Scattered Spider threat actors targeting commercial facilities.
Security Affairs
US CISA added 3 vulnerabilities (tracked as CVE-2023-36584, CVE-2023-1671, and CVE-2023-2551) to its Known Exploited Vulnerabilities catalog.
Infosecurity News
Postal service was breached in January 2023
Security Affairs
Fortinet warns of a critical OS command injection flaw in FortiSIEM report server that could be exploited to execute arbitrary commands
Cyber Security News
Cybersecurity researchers identified a FortiSIEM injection flaw that lets execute malicious commands & tracked as "CVE-2023-36553."
The Hacker News
U.S. CISA has added three security flaws to its Known Exploited Vulnerabilities (KEV) catalog due to evidence of active exploitation in the wild.
Bleeping Computer
MySQL servers are being targeted by the 'Ddostf' malware botnet to enslave them for a DDoS-as-a-Service platform whose firepower is rented to other cybercriminals.
Latest Hacking News
This week marked the Redmond giant Microsoft’s monthly security updates for its products. With Patch Tuesday November, Microsoft addressed fewer vulnerabilities – over 60 only, including five zero-day flaws. Five Zero-Days Patched With Latest Microsoft Updates Microsoft
Bleeping Computer
Fortinet is alerting customers of a critical OS command injection vulnerability in FortiSIEM report server that could be exploited by remote, unauthenticated attackers to execute commands through specially crafted API requests.
The Hacker News
Novel attack methods targeting Google Workspace & Cloud Platform could enable ransomware and data breaches.
CyberNews
Hive lost its aura in January 2023, when the FBI and other law enforcement agencies in Germany penetrated Hive’s computer network.
Cyber Security News
Wireshark is a popular open-source network protocol analyzer that is primarily used by security experts and network administrators.
Cyber Security News
CacheWarp, is a new software-based fault attack that allows attackers to gain access to encrypted virtual machines (VMs).
Security Affairs
The FBI and CISA warn of attacks carried out by the Rhysida ransomware group against organizations across multiple industry sectors.
The Hacker News
Denmark's energy sector hit by massive cyberattack! In May 2023, 22 Danish energy sector companies were simultaneously targeted.
Cyber Security News
Hackers use networks of compromised computers (botnets) to generate massive traffic, disrupting the target's normal functioning by overloading its resources. The goal is to make a website or online service inaccessible to legitimate users.
CyberNews
The US Federal Aviation Administration (FAA) grants Elon’s Musk’s SpaceX a license to launch 2nd test flight of its Starship and “Super Heavy” lift rocket.
CSO
New product and service announcements from Wiz, Palo Alto Networks, Sophos, SecureAuth, Kasada, Lacework, Noname Security, and more.
The Record
Ransomware group AlphV claimed on its leak site that it reported MeridianLink to the Securities and Exchange Commission (SEC) for not informing the regulator of a cyberattack.
The Record
LexisNexis Risk Solutions provided CBP with capabilities such as collecting geolocation data, monitoring social media accounts and tracking cell phone call histories for non-U.S. and U.S. residents alike, according to documents obtained by an advocacy group.
Ars Technica
Amid GPU shortages, Microsoft reaches for custom silicon to run its AI language models.
SecurityWeek
Microsoft provided guidance on an Azure CLI bug leading to the exposure of sensitive information through GitHub Actions logs.
SecurityWeek
CISA details its efforts to promote the use of AI in cybersecurity and guide critical infrastructure in adopting AI.
SecurityWeek
The rise of AI-powered disinformation presents an immense challenge to society’s ability to discern fact from fiction.
Cyber Security News
Hackers may exploit LNK files to deliver malicious payloads by disguising them as legitimate shortcuts, and execution of malicious code.
The Record
The elite U.K. hacking unit eventually will be more integrated into police operations, alongside military and intelligence ones, according to Gen. Sir Jim Hockenhull, the chief of Strategic Command.
Bleeping Computer
The WordPress plugin WP Fastest Cache is vulnerable to an SQL injection vulnerability that could allow unauthenticated attackers to read the contents of the site's database.
DarkReading
Another two bugs in this month's set of fixes for 63 CVEs were publicly disclosed previously but have not been exploited yet.
Bleeping Computer
A new software-based fault injection attack, CacheWarp, can let threat actors hack into AMD SEV-protected virtual machines by targeting memory writes to escalate privileges and gain remote code execution.
Bleeping Computer
Today is Microsoft's November 2023 Patch Tuesday, which includes security updates for a total of 58 flaws and five zero-day vulnerabilities.
Bleeping Computer
Microsoft has fixed a critical security vulnerability that could let attackers steal credentials from GitHub Actions or Azure DevOps logs created using Azure CLI (short for Azure command-line interface).
Cyber Security News
Metasploit is an open-source penetration testing framework created by Rapid7 that enables security professionals to simulate attacks against computer systems, networks, and applications.
DarkReading
The swift-moving ransomware crew continues to evolve quickly and has already attacked more than 350 victims since it was first detected just over a year ago.
SecurityWeek
Researchers warn attackers are targeting MySQL servers and Docker hosts to plant malware capable of launching distributed DDoS attacks.
CyberNews
Researchers find that Flipper Zero can connect and control adult toys remotely by making them vibrate or stop working via a Bluetooth Low-Energy (BLE) broadcast.
CyberNews
A threat actor targeting West Asian governments now uses a labyrinthine infection chain based on delivering a new initial access downloader dubbed IronWind
SecurityWeek
Chris Wysopal (AKA Weld Pond) founder and CTO of Veracode and member of the hacker collective L0pht Heavy Industries.
The Hacker News
Publicly-accessible Docker Engine API instances are under attack! Threat actors aim to create a DDoS botnet called OracleIV.
Infosecurity News
TA402 launches new targeted phishing campaigns
The Hacker News
Vietnamese hackers behind Ducktail malware launch a new campaign targeting Indian marketing pros.
The Record
Gov. Kathy Hochul says the proposed regulations "set forth a nation-leading blueprint" for protecting hospital networks.
Trend Micro
This blog entry explores the effectiveness of ChatGPT's safety measures, the potential for AI technologies to be misused by criminal actors, and the limitations of current AI models.
DarkReading
Threat actors distributed an archive containing images of new products by major clothing companies, along with a malicious executable disguised with a PDF icon.
Bleeping Computer
A cyberattack on international logistics firm DP World Australia has severely disrupted the regular freight movement in multiple large Australian ports.
Security Affairs
US CISA added four vulnerabilities in Juniper devices to its Known Exploited Vulnerabilities catalog.
Infosecurity News
Cado Security Labs said the bot agent exhibited various methods for conducting DDoS attacks
Bleeping Computer
The Criminal IP threat intelligence search engine by AI SPERA has recently integrated with Cisco SecureX/XDR, empowering organizations to stay ahead of malicious actors. Learn more about this integration from Criminal IP in this article.
Cyber Security News
The ongoing conflict between Israel and Hamas has taken a new turn as cyberattacks have become a prominent weapon for both sides.
The Hacker News
A new ransomware group, Hunters International, has taken over the reins from Hive, acquiring its source code and infrastructure.
The Hacker News
Don't leave your marketing data exposed. Discover the top challenges in securing SaaS applications used by marketing teams.
The Hacker News
Chinese nation-state hackers are targeting 24 Cambodian government organizations in a long-term espionage campaign.
CyberSecurity Dive
According to a new report, security teams are struggling amid relentless cyberattacks and limited resources. What can leaders do to set their teams up for a more stable 2024?
Bleeping Computer
Security researchers have tracked a new campaign from Imperial Kitten targeting transportation, logistics, and technology firms.
Cyber Security News
Best Free Digital Forensic Tools: 1. Sleuth Kit (+Autopsy) 2. Forensic Investigator 3.Autopsy 4. Dumpzilla 5. X-Ways Forensics.
Cyber Security News
One of the common methods used for delivering the ransomware, RATs, and Cryptojackers was the use of a batloader.
Bleeping Computer
Ransomware attacks are rapidly becoming the weapon of choice, making up over half of all attacks in the healthcare industry. Learn more from Specops Software on securing your organization from these attacks.
Cyber Security News
Attackers have been observed spreading malicious Python packages disguised as legitimate obfuscation tools that contain malicious code.
The Hacker News
Iranian hacker group Imperial Kitten launches cyberattacks on transportation, logistics, and tech sectors, including Israel.
The Hacker News
Urdu-speaking readers in Gilgit-Baltistan, beware! A WATERING HOLE ATTACK using Kamran spyware has been uncovered by ESET
Trend Micro
We encountered the Cerber ransomware exploiting the Atlassian Confluence vulnerability CVE-2023-22518 in its operations.
The Record
The Click Here podcast team reports on wartime technological improvisations: An activist unexpectedly leads an effort to identify the missing and the dead. And an English teacher finds a way to connect mobile phones as infrastructure collapses.
DarkReading
Checkmarx researchers warn that BlazeStealer can exfiltrate information, steal passwords, disable PCs, and take over webcams.
CyberScoop
Microsoft and Mandiant researchers believe Iranian hackers were not prepared for the initial Hamas attack.
Bleeping Computer
Microsoft publicly acknowledged a known issue causing Windows Server 2022 virtual machine (VM) blue screens and boot failures on VMware ESXi hosts.
Infosecurity News
ESET said the attack affects Android users accessing the Urdu version of the Hunza News website
Infosecurity News
CrowdStrike attributes recent attacks on the Israeli transportation, logistics, and technology sectors to Iran-affiliated group Imperial Kitten
Bleeping Computer
Russian state hackers have evolved their methods for breaching industrial control systems by adopting living-off-the-land techniques that enable reaching the final stage of the attack quicker and with less resources
The Hacker News
MuddyWater expands its cyber arsenal with MuddyC2Go, a new C2 framework used in sophisticated attacks targeting Israel.
Cyber Security News
Google Calendar RAT is a proof of concept for Command & Control . It's useful when setting up a full red teaming infrastructure.
The Record
NATO delegates gathered on Thursday for the alliance’s first annual Cyber Defence Conference, marking a growing acceptance among allies that new methods are needed to tackle cyberattacks beyond resilience.
The Record
The Iranian hacking group targeted organizations in Israel’s transportation, logistics and technology sectors amid an uptick in Iranian cyber activity since the start of Israel’s war with Hamas.
DarkReading
The attacks are another manifestation of the concerning rise in information stealers for harvesting data and enabling persistent access to enterprise networks.
CSO
Google Cloud forecasts continued use of gen AI to create smarter campaigns while cybersecurity pros will use the same tools to defend and close the skills gap.
Ars Technica
Packages downloaded thousands of times targeted people working on sensitive projects.
Bleeping Computer
The Federal Bureau of Investigation is warning that ransomware threat actors are targeting casino servers and use legitimate system management tools to increase their permissions on the network.
Infosecurity News
The FBI notification advises how to protect against the growing targeting of third-party vendors and services
CyberNews
Advanced bargain-stealing bots make up more than half of automated retail traffic, says cybersecurity analyst Imperva.
CyberNews
Cybernews asked more than 30 experts from various fields if they’d be willing to pay a ransom in the event of a cybersecurity breach.
CSO
The platform analyzes XIoT firmware using large language model capabilities to follow compromised or vulnerable assets back to their source.
Bleeping Computer
The North Korean-backed BlueNorOff threat group targets Apple customers with new macOS malware tracked as ObjCShellz that can open remote shells on compromised devices.
DarkReading
Kim Jong-Un's hackers are scraping the bottom of the barrel, using script kiddie-grade malware to steal devalued digital assets.
CSO
The guide offers supply chain risk intelligence for IT infrastructure including endpoints, servers, network devices, and cloud infrastructure products.
Cyber Security News
Researchers from Any Run saw again its active activity intended to develop to steal, cause financial loss, and data, targeting both enterprise and personal devices.
Infosecurity News
IBM found Gootloader group opting for GootBot over off-the-shelf tools for lateral movement
Cyber Security News
Millenium-RAT, a sophisticated Remote Access Tool (RAT) for Windows systems, is now available for purchase on GitHub.
Infosecurity News
Jamf Threat Labs found a Mach-O universal binary communicating with an identified malicious domain