Microsoft Revokes Many Signed Drivers Used by Chinese Cybercriminals
After being notified by several security firms, Microsoft has revoked many signed drivers that had been leveraged by threat actors, in many cases by Chinese…
After being notified by several security firms, Microsoft has revoked many signed drivers that had been leveraged by threat actors, in many cases by Chinese…
Threat landscape trends demonstrate the impressive flexibility of cybercriminals as they continually seek out fresh methods of attack, including exploiting vulnerabilities, gaining unauthorized access, compromising…
Microsoft has disclosed a potentially serious remote code execution (RCE) zero-day under active exploitation – by a group with alleged links to the Russian intelligence…
Fortinet on Tuesday announced security updates that address a critical-severity vulnerability in FortiOS and FortiProxy that could be exploited for remote code execution (RCE). Tracked…
Eskenzi PR has today opened nominations for its eighth annual Security Serious Unsung Heroes Awards. The awards are all about celebrating the UK’s cybersecurity professionals,…
Jul 12, 2023THNCyber Threat / Gaming Cybersecurity researchers have unearthed a novel rootkit signed by Microsoft that’s engineered to communicate with an actor-controlled attack infrastructure.…
Tech industry coalition FutureDotNow is calling on government and businesses to work together to help close the IT skills gap, marking the publication of a…
What happens when ransom negotiations fail? Leading financial services firm Ameritrade has been targeted and victimized by the notorious Cl0p ransomware group following a failed…
Sophisticated hackers have accessed email accounts of organizations and government agencies via authentication tokens they forged by using an acquired Microsoft account (MSA) consumer signing…
A teenage boy from the Lapsus$ hacking group arrested on charges of breaching Uber and other companies was assessed as not fit for trial. The…
Bug Bytes is a weekly newsletter curated by members of the bug bounty community. The second series is curated by InsiderPhD. Every week, she keeps…
Jul 12, 2023The Hacker NewsCloud Security / Cryptocurrency A new fileless attack dubbed PyLoose has been observed striking cloud workloads with the goal of delivering…