DarkCracks isn’t your typical malware campaign—it’s a sophisticated Launcher designed for long-term exploitation. It deploys malicious payloads through public websites, like school portals and booking systems, to infect unsuspecting users. This article has been indexed from Cyware News – Latest…
Category: Cyware News – Latest Cyber News
Fog Ransomware Now Targeting the Financial Sector
Fog, a variant of STOP/DJVU family, targets various sectors, exploiting VPN vulnerabilities to infiltrate network defenses. After infiltration, Fog ransomware disables protective measures, encrypts vital files, and demands ransom via the Tor network. This article has been indexed from Cyware…
CyberVolk Ransomware: A New and Evolving Threat to Global Cybersecurity
CyberVolk, infamous for DDoS attacks and data breaches, has gained particular notoriety for its ransomware, detected in July 2024, due to its advanced features and capabilities. This article has been indexed from Cyware News – Latest Cyber News Read the…
Penpie DeFi platform files reports with FBI, Singapore police after $27 million crypto theft
The Penpie DeFi platform recently reported a $27 million cryptocurrency theft to the FBI and Singapore police. Hackers targeted the protocol, stealing ethereum and prompting Penpie to halt withdrawals and deposits. This article has been indexed from Cyware News –…
Sami Khoury, Head of Canada’s Cyber Agency, Starts New Role in Government
Sami Khoury, the head of Canada’s cyber agency, is moving to a new role as the government’s senior official for cybersecurity after leading the Canadian Centre for Cyber Security (CCCS) since August 2021. This article has been indexed from Cyware…
New Android SpyAgent Campaign Steals Crypto Credentials via Image Recognition
A new mobile malware called SpyAgent has been uncovered by McAfee’s Mobile Research Team. This malware targets mnemonic keys used for cryptocurrency wallets by scanning for images containing them on your device. This article has been indexed from Cyware News…
OpenStack Ironic Users Urged to Patch Critical Vulnerability
The flaw, discovered by security researchers at Red Hat and G-Research, could lead to unauthorized access to sensitive data through mishandled images processed by qemu-img. This article has been indexed from Cyware News – Latest Cyber News Read the original…
US Posts Indictments, Rewards in Russia’s WhisperGate Hacks Against Ukraine
The US has indicted members of Russian military intelligence unit 29155 for cyber-operations including WhisperGate hacks against Ukraine, offering up to $10 million for information. This article has been indexed from Cyware News – Latest Cyber News Read the original…
Critical Foreman Flaw Exposes Red Hat Satellite to Unauthorized Access
This authentication bypass flaw, with a CVSS score of 9.8 (the highest severity rating), could enable unauthorized users to gain administrative access to Red Hat Satellite, a commercial offering built on Foreman. This article has been indexed from Cyware News…
Hackers Linked to Russia and Belarus Increasingly Target Latvian Websites, Officials Say
Hackers from Russia and Belarus are increasingly targeting Latvian government and critical infrastructure websites in politically motivated cyberattacks, according to Latvian cybersecurity officials. This article has been indexed from Cyware News – Latest Cyber News Read the original article: Hackers…
MuddyWater Hijacks RMM Software for Espionage
MuddyWater, an Iranian hacker group since 2017, has been using legitimate RMM software to target organizations globally, focusing on government, military, telecom, and oil sectors. This article has been indexed from Cyware News – Latest Cyber News Read the original…
Report: 83% of Organizations Experienced at Least One Ransomware Attack in the Last Year
According to Onapsis, 83% of organizations experienced a ransomware attack in the past year. Of those, 46% experienced four or more attacks, and 14% faced 10 or more. The attacks resulted in at least 24 hours of downtime for 61%…
Goffloader: In-Memory Execution, No Disk Required
Praetorian has uncovered GoffLoader, an in-memory execution tool that allows security professionals to run BOF and unmanaged Cobalt Strike PE files directly in memory without writing to disk. This article has been indexed from Cyware News – Latest Cyber News…
CVE-2024-26581 PoC Exploit Released: Linux Systems at Risk of Root Compromise
The CVE-2024-26581 PoC exploit has been disclosed, posing a risk to Linux systems by allowing root compromise. The flaw exists in the nft_set_rbtree function within the Linux kernel, enabling attackers to access sensitive data on affected systems. This article has…
Respotter: Open-Source Responder Honeypot
Respotter is an open-source honeypot designed to detect attackers when they launch Responder within your environment. This application identifies active instances of Responder by exploiting its behavior when responding to any DNS query. This article has been indexed from Cyware…
White House Launches Cybersecurity Hiring Sprint To Help Fill 500,000 Job Openings
The White House has launched a cybersecurity hiring sprint to fill 500,000 job openings, part of a program to address the ongoing shortage in cyber, technology, and AI positions. This article has been indexed from Cyware News – Latest Cyber…
Malvertising Campaign Phishes Lowe’s Employees
The fake landing pages closely mimicked the real Lowe’s portal, prompting employees to enter their sales numbers, passwords, and security question answers, which then were sent to attackers. This article has been indexed from Cyware News – Latest Cyber News…
Critical Vulnerability Discovered in Progress LoadMaster
Progress Software has alerted users to a critical vulnerability (CVE-2024-7591) in its LoadMaster ADC and load balancer solution. The flaw, with a CVSS score of 10, allows remote attackers to execute system commands without authentication. This article has been indexed…
Infosec Spending to Hit 3-Year Growth Peak, Reach $212B Next Year: Gartner
Global spending on information security is on track to reach nearly $212 billion next year, with a projected 15% increase from 2024. The majority of this spending is in security software, particularly in endpoint protection platforms. This article has been…
Use of Predator Spyware Rebounds After a Dip From Biden Sanctions, Researchers Say
Despite facing sanctions, Predator has managed to attract new customers and has been detected in various countries, including the Democratic Republic of Congo and Angola. This article has been indexed from Cyware News – Latest Cyber News Read the original…