Cyclops
15
Aug
2024

Malware Platform “Cyclops” Allows Hackers to Write Arbitrary Commands

Researchers have uncovered a new and previously undocumented malware platform named “Cyclops.” Written in the Go programming language, Cyclops has…

Ransomware Group Added a New EDR Killer Tool to their arsenal
15
Aug
2024

Ransomware Group Added a New EDR Killer Tool to their arsenal

A ransomware group known as RansomHub has been found deploying a new tool designed to disable endpoint detection and response…

Jane Devry
15
Aug
2024

Cryptography: A Forgotten Part of Software Supply Chain Security

Securing the software supply chain has become a top priority due to high-profile breaches and increasing regulatory scrutiny. International agencies…

Cybercrime Magazine Heads To Fire Island For The Day
15
Aug
2024

Cybercrime Magazine Heads To Fire Island For The Day

15 Aug Cybercrime Magazine Heads To Fire Island For The Day Posted at 09:21h in Blogs by Di Freeze This…

New Threat Actors Tools Found to be Bypassed Antivirus & Delete Backups
15
Aug
2024

Threat Actors Tools Found to be Bypassed Antivirus & Delete Backups

A recent Digital Forensics and Incident Response (DFIR) report has uncovered various sophisticated tools threat actors employ to bypass major…

Nearly All Google Pixel Phones Exposed by Unpatched Flaw in Hidden Android App
15
Aug
2024

Nearly All Google Pixel Phones Exposed by Unpatched Flaw in Hidden Android App

Google’s flagship Pixel smartphone line touts security as a centerpiece feature, offering guaranteed software updates for seven years and running…

Choosing Security: Why Companies Should Reject Ransom Payments
15
Aug
2024

Choosing Security: Why Companies Should Reject Ransom Payments

With ransomware attacks reaching unprecedented levels, businesses face tough decisions when their data is held hostage. While the temptation to…

Time to explore the Digital Operational Resilience Act (DORA)
15
Aug
2024

Time to explore the Digital Operational Resilience Act (DORA)

Today, ICT-related incidents remain rampant, with the scourge of data breaches showing no sign of abating. This year,millions of records will unfortunately once again be affected with the ramifications being severe and the average…

European NGOs and Media
15
Aug
2024

Russian-Linked Hackers Target Eastern European NGOs and Media

Aug 15, 2024Ravie LakshmananCyber Attack / Social Engineering Russian and Belarusian non-profit organizations, Russian independent media, and international non-governmental organizations…

Hacking GitHub Repositories Via Race Condition That leads To Remote Code Execution
15
Aug
2024

GitHub Vulnerability “ArtiPACKED” Trigger RCE Exploit to Hack Repositories

The research identifies a critical security vulnerability in GitHub Actions artifacts, enabling unauthorized access to tokens and secrets within CI/CD…

EDR-Killing Tool
15
Aug
2024

RansomHub Group Deploys New EDR-Killing Tool in Latest Cyber Attacks

Aug 15, 2024Ravie LakshmananRansomware / Cybercrime A cybercrime group with links to the RansomHub ransomware has been observed using a…

'Blackswans' take flight: the legal ramifications of the CrowdStrike incident  
15
Aug
2024

‘Blackswans’ take flight: the legal ramifications of the CrowdStrike incident  

Public admission of failure takes courage. In trying to limit reputational damage to his cybersecurity company, CrowdStrike president Michael Sentonas…