New Linux Malware 'Perfctl' Targets Millions by Mimicking System Files
03
Oct
2024

New Linux Malware ‘Perfctl’ Targets Millions by Mimicking System Files

New Linux malware ‘Perfctl’ is targeting millions worldwide, mimicking system files to evade detection. This sophisticated malware compromises Linux servers,…

2G Exploits and Baseband Attacks
03
Oct
2024

Android 14 Adds New Security Features to Block 2G Exploits and Baseband Attacks

Oct 03, 2024Ravie LakshmananMobile Security / Technology Google has revealed the various security guardrails that have been incorporated into its…

Over 4,000 Adobe Commerce, Magento shops hacked in CosmicSting attacks
03
Oct
2024

Over 4,000 Adobe Commerce, Magento shops hacked in CosmicSting attacks

Adobe Commerce and Magento online stores are being targeted in “CosmicSting” attacks at an alarming rate, with threat actors hacking approximately…

How To Collect Malware Indicators Of Compromise In The ANY.RUN Sandbox
03
Oct
2024

How To Collect Malware Indicators Of Compromise In The ANY.RUN Sandbox

Indicators of Compromise (IOCs) are critical forensic artifacts that cybersecurity researchers use to “detect,” “investigate,” and “mitigate” security threats. As…

Attack Surface Management to the Rescue – Find, Fix, Fortify Your ASM with Criminal IP
03
Oct
2024

Attack Surface Management to the Rescue – Find, Fix, Fortify Your ASM with Criminal IP

Decoding Compliance | What CISOs Need to Know Non-compliance can result in substantial financial penalties, with average fines reaching up…

Apple
03
Oct
2024

Fraudsters imprisoned for scamming Apple out of 6,000 iPhones

Two Chinese nationals were sentenced to prison for scamming Apple out of more than $2.5 million after exchanging over 6,000…

Telegram API to Intercept Data Exfiltrated by Malware
03
Oct
2024

How Analysts Use Telegram API to Intercept Data Exfiltrated by Malware

Threat actors are increasingly relying on Telegram and Discord apps for data exfiltration. Analysts at ANY.RUN shared a detailed guide…

SquareX Shows How Malicious Extensions Bypass Google’s MV3 Restrictions
03
Oct
2024

SquareX Shows How Malicious Extensions Bypass Google’s MV3 Restrictions

At DEF CON 32, the SquareX research team delivered a hard-hitting presentation titled Sneaky Extensions: The MV3 Escape Artists where…

Doppler Launches 'Change Requests' to Strengthen Secrets Management Security with Audited Approvals
03
Oct
2024

Doppler Launches ‘Change Requests’ to Strengthen Secrets Management Security with Audited Approvals

San Francisco, United States / California, October 3rd, 2024, CyberNewsWire Doppler, the leading platform in secrets management, today announces the…

Non-Human Identities
03
Oct
2024

The Secret Weakness Execs Are Overlooking: Non-Human Identities

For years, securing a company’s systems was synonymous with securing its “perimeter.” There was what was safe “inside” and the…

Microsoft files lawsuit to seize domains used by Russian spooks
03
Oct
2024

Microsoft files lawsuit to seize domains used by Russian spooks

The United States District Court for the District of Columbia has today (3 October) unsealed a civil action brought by…

Specops Password Dictionary
03
Oct
2024

Why your password policy should include a custom dictionary

If your organization is like many, your employees may be relying on weak or easily guessable passwords — and inadvertently…