How organizations can navigate identity security risks in 2024
29
Feb
2024

How organizations can navigate identity security risks in 2024

Managing IAM challenges in hybrid IT environments requires a holistic approach, integrating solutions and automating processes to ensure effective access…

Backdoor
29
Feb
2024

New Backdoor Targeting European Officials Linked to Indian Diplomatic Events

Feb 29, 2024NewsroomCyber Espionage / Malware A previously undocumented threat actor dubbed SPIKEDWINE has been observed targeting officials in European…

Cryptocurrency Cyberattack 
29
Feb
2024

New Cryptocurrency Cyberattack Target MacOS Users

In a recent wave of cyberattacks on cryptocurrency enthusiasts, malicious actors have been employing sophisticated tactics to infiltrate macOS systems….

US DoJ seized domains used by North Korean IT workers to defraud businesses worldwide
29
Feb
2024

Lazarus APT exploited 0-day in Win driver to gain kernel privileges

Lazarus APT exploited zero-day in Windows driver to gain kernel privileges Pierluigi Paganini February 29, 2024 North Korea-linked Lazarus APT…

Seahorse
29
Feb
2024

Savvy Seahorse gang uses DNS CNAME records to power investor scams

Image: Midjourney A threat actor named Savvy Seahorse is abusing CNAME DNS records Domain Name System to create a traffic…

Millions of GitHub Repos Found infected With malicious Code
29
Feb
2024

Millions of GitHub Repos Found infected With malicious Code

Security researchers have uncovered a massive campaign of repository confusion attacks on GitHub, affecting over 100,000 repositories and potentially millions…

BobTheSmuggler: Open-source tool for undetectable payload delivery
29
Feb
2024

BobTheSmuggler: Open-source tool for undetectable payload delivery

BobTheSmuggler is an open-source tool designed to easily compress, encrypt, and securely transport your payload. It basically enables you to…

Ivanti VPN Flaws
29
Feb
2024

Chinese Hackers Exploiting Ivanti VPN Flaws to Deploy New Malware

At least two different suspected China-linked cyber espionage clusters, tracked as UNC5325 and UNC3886, have been attributed to the exploitation…

Digital email
29
Feb
2024

Key Takeaways from the Latest Phishing Attacks

These days, cyber threat actors continue to rely just as much on psychological manipulation in the form of convincing phishing…

Lazarus Hackers Exploited Windows 0-Day to Gain Kernel Access
29
Feb
2024

Lazarus Hackers Exploited Windows 0-Day to Gain Kernel Access

The Lazarus Group, a well-known cybercriminal organization, has recently exploited a zero-day vulnerability in Windows to gain kernel privileges, a…

AnyDesk hit by ransomware and Cloudflare hacked
29
Feb
2024

Ransomware infection reach extends to Data Backups

For years, IT experts have emphasized the importance of maintaining backups for data and applications, highlighting their crucial role in…

Cryptojacking is no longer the sole focus of cloud attackers
29
Feb
2024

Cryptojacking is no longer the sole focus of cloud attackers

As commercial adoption of cloud technologies continues, cloud-focused malware campaigns have increased in sophistication and number – a collective effort…