New Linux Variant of FASTCash Malware Targets Payment Switches in ATM Heists
Oct 15, 2024Ravie LakshmananFinancial Fraud / Linux North Korean threat actors have been observed using a Linux variant of a known malware family called FASTCash…
Oct 15, 2024Ravie LakshmananFinancial Fraud / Linux North Korean threat actors have been observed using a Linux variant of a known malware family called FASTCash…
Improving productivity in policing through technology and digital skills can create the equivalent of 30,000 more police officers and staff, and could free up as…
To help organizations keep up with the shifting landscape of VDP mandates and recommendations, HackerOne has developed the Global Vulnerability Policy Map, an interactive map-based…
A code signing certificate is a digital certificate that allows software developers to sign their applications. This ensures both the “authenticity of the publisher” and…
The Horus Protector crypter is being used to distribute various malware families, including AgentTesla, Remcos, Snake, NjRat, and others, whose primarily spread through archive files…
ESET Research found the Telekopye scam network targeting Booking.com and Airbnb. Scammers use phishing pages via compromised accounts to steal personal and payment details from…
Cisco Data Breach by IntelBroker A prominent threat actor known as IntelBroker has claimed responsibility for breaching Cisco’s computer network and is preparing to release…
Oct 15, 2024Ravie LakshmananMalware / Cybercrime Cybersecurity researchers have disclosed a new malware campaign that leverages a malware loader named PureCrypter to deliver a commodity…
The UK government has formally launched a research and funding programme dedicated to improving “systemic AI safety”, which will see up to £200,000 in grants…
The Fast IDentity Online (FIDO) Alliance has published a working draft of a new specification that aims to enable the secure transfer of passkeys between…
In a disturbing development for e-commerce security, cybersecurity experts have revealed that threat actors are actively exploiting the CosmicSting vulnerability (CVE-2024-34102) to compromise 3 to…
More than 50% of executives expect deepfake attacks to increase over the next 12 months, but only 7% report using new technologies to detect deepfakes.…