Attackers increasingly using transfer.sh to host malicious code
For many years now, unsecured internet-facing Redis servers have been steadily getting co-opted by criminals to mine cryptocurrency, so the latest cryptojacking campaign spotted by…
For many years now, unsecured internet-facing Redis servers have been steadily getting co-opted by criminals to mine cryptocurrency, so the latest cryptojacking campaign spotted by…
Mar 02, 2023Ravie LakshmananData Security / Cryptojacking Misconfigured Redis database servers are the target of a novel cryptojacking campaign that leverages a legitimate and open…
Vice Society ransomware group claimed responsibility for the cyber attack on the global molten metal engineering company Vesuvius. The London Stock Exchange-listed company disclosed the…
Days after reports came out that former Lockbit 3.0 affiliates are promoting a new ‘Exfiltrator-22’ post-exploitation framework, the ransomware gang has denied any links to…
The National Cybersecurity Strategy was unveiled today by the Biden-Harris Administration. The Strategy recognizes that government must use all tools of national power in a…
The world has been witnessing an alarming rise in ransomware attacks, causing a growing menace for organizations worldwide. Ransomware attacks surged by 10% compared to…
Atlas Intelligence Group (AIG), a notorious threat actor, is peddling top-secret classified documents related to various US federal agencies on their Telegram channel. This poses…
Payment giants Visa and Mastercard are slamming the brakes on plans to forge new partnerships with crypto firms after a string of high-profile collapses shook…
With the EU Cyber Resilience Act (CRA), the industry is dealing with one of the strictest regulatory requirements. Manufacturers, importers and even distributors of products…
NAB is hoping customers that require support will increasingly initiate the contact from within their mobile banking apps – an authenticated channel – instead of…
Hybrid phishing attacks continue to pose a clear and present danger to all organizations. How can these threats be mitigated to reduce their impact? A…
ESET researchers have published the first analysis of a UEFI bootkit capable of circumventing UEFI Secure Boot, a critical platform security feature. The functionality of…