DHS establishes AI Safety and Security Board to protect critical infrastructure
29
Apr
2024

DHS establishes AI Safety and Security Board to protect critical infrastructure

The Department of Homeland Security announced the establishment of the Artificial Intelligence Safety and Security Board (the Board). The Board…

Hunters Group Hits US Sales Firm, Australian Medical Supplier
29
Apr
2024

Hunters Group Hits US Sales Firm, Australian Medical Supplier

The notorious Hunters group has allegedly added two new victims to their dark web portal: Rocky Mountain Sales in the…

Dolly.com pays ransom, attackers release data anyway
29
Apr
2024

The Los Angeles County Department of Health Services disclosed a data breach

The Los Angeles County Department of Health Services disclosed a data breach Pierluigi Paganini April 29, 2024 The Los Angeles…

IcedID Infection to Dagon Locker Ransomware
29
Apr
2024

29-Days From IcedID Infection to Dagon Locker Ransomware Deployment

In a sophisticated cyberattack that unfolded over 29 days, cybersecurity analysts have meticulously traced the steps of threat actors from…

Android Malware Brokewell
29
Apr
2024

KageNoHitobito Ransomware Attacking Windows Users

A new ransomware named KageNoHitobito has been targeting Windows users across various countries. It encrypts their data and demands a…

City of Philadelphia suffers a data breach
29
Apr
2024

Multiple Brocade SANnav SAN Management SW flaws allow device compromise

Multiple Brocade SANnav SAN Management SW flaws allow device compromise Pierluigi Paganini April 29, 2024 Multiple flaws in Brocade SANnav…

Find Malware With ANY RUN Threat Intelligence YARA Search by File Contents
29
Apr
2024

Find Malware With ANY RUN Threat Intelligence YARA Search

YARA is a rule-based malware detection tool that utilizes regular expressions and textual/binary signatures to create descriptions (rules) for identifying…

Android Malware Brokewell
29
Apr
2024

Okta Warns of Credential Stuffing Attacks Using Proxy Services

Okta has issued a warning about the increasing prevalence of credential-stuffing attacks. These attacks, which leverage stolen user credentials to…

week in security
29
Apr
2024

A week in security (April 22 – April 28)

April 24, 2024 – The US Senate has approved a bill that will ban TikTok, unless it finds a new…

NoName ransomware group
29
Apr
2024

NoName Ransomware Group Targets Moldova In Cyberattack

The notorious NoName ransomware group this time has allegedly set its sights on Moldova, targeting key government websites in what…

Fileless .NET Based Code Injection Attack Delivers AgentTesla Malware
29
Apr
2024

Fileless .NET Based Code Injection Attack Delivers AgentTesla Malware

A recent malware campaign used a VBA macro in a Word document to download and execute a 64-bit Rust binary….

Closing the cybersecurity skills gap with upskilling programs
29
Apr
2024

Closing the cybersecurity skills gap with upskilling programs

The list of skills technologists and organizations need to succeed grows with each new tech advancement, according to Pluralsight. But…