The CISA has launched a cyber incident reporting portal to make breach disclosure easier. It allows organizations to report cyberattacks, vulnerabilities, and data breaches voluntarily. This article has been indexed from Cyware News – Latest Cyber News Read the original…
Category: Cyware News – Latest Cyber News
NIST Releases New Draft of Digital Identity Proofing Guidelines
The new draft of NIST’s digital identity proofing guidelines includes updates to accommodate passkeys and mobile driver’s licenses, as well as options for identification without using biometrics like facial recognition. This article has been indexed from Cyware News – Latest…
Cyber Threats That Shaped the First Half of 2024
According to a report by Critical Start Cyber Research Unit, the manufacturing industry was the top target for cyber threats in H1 2024, professional services saw a 15% increase in attacks, and healthcare experienced a 180% surge in incidents. This…
North Korean Cyberattacks Persist: Developers Targeted via npm Packages
The campaign, known as “Contagious Interview,” tricks developers into downloading fake npm packages or installers. The attackers deploy a Python payload named InvisibleFerret to steal data from cryptocurrency wallets. This article has been indexed from Cyware News – Latest Cyber…
OceanLotus APT Group Targeting Vietnamese Human Rights Defenders
The attackers use spear-phishing lures and watering hole campaigns to infiltrate networks and collect sensitive data. Huntress identified four compromised hosts in recent attacks, linking them to Cobalt Strike Beacons and encrypted DLL payloads. This article has been indexed from…
State-Backed Attackers and Commercial Surveillance Vendors Repeatedly Use the Same Exploits
Russian hackers exploited vulnerabilities in Safari and Chrome to launch cyberattacks from November 2023 to July 2024. They used a watering hole attack on Mongolian government websites to infect mobile users with malware, stealing information. This article has been indexed…
Rocinante: The Trojan Horse That Wanted to Fly
Once installed, the Rocinante malware prompts the victim to grant Accessibility Services and displays phishing screens tailored to different banks to steal personal information. This article has been indexed from Cyware News – Latest Cyber News Read the original article:…
FBI: RansomHub Ransomware Breached 210 Victims Since February 2024
The ransomware operation focuses on data theft extortion rather than encrypting files, with victims facing the threat of stolen data being leaked or sold if negotiations fail. This article has been indexed from Cyware News – Latest Cyber News Read…
New Snake Keylogger Variant Slithers Into Phishing Campaigns
The attack starts with a phishing email disguised as a fund transfer notification, with an attached Excel file named “swift copy.xls” that triggers the deployment of Snake Keylogger on the victim’s computer upon opening. This article has been indexed from…
Godzilla Fileless Backdoors Targeting Atlassian Confluence
The Godzilla fileless backdoor relies on a complex series of actions, such as cryptographic operations, class loading, and dynamic injection, to establish unauthorized access. This article has been indexed from Cyware News – Latest Cyber News Read the original article:…
Suspected Espionage Campaign Delivers New Voldemort Malware
The campaign, which targeted organizations worldwide, involved impersonating tax authorities from various countries and utilizing Google Sheets for command and control (C2). This article has been indexed from Cyware News – Latest Cyber News Read the original article: Suspected Espionage…
Operation DevilTiger: APT-Q-12’s Shadowy Tactics and Zero-Day Exploits Unveiled
The QiAnXin Threat Intelligence Center has revealed the details of “Operation DevilTiger,” a cyber espionage campaign carried out by the elusive APT-Q-12 group, also known as “Pseudo Hunter.” This article has been indexed from Cyware News – Latest Cyber News…
US Offers $2.5 Million Reward for Hacker Linked to Angler Exploit Kit
The U.S. Department of State and the Secret Service are offering a reward of $2.5 million for information leading to the capture of Belarusian cybercriminal Volodymyr Kadariya, who is linked to the Angler Exploit Kit. This article has been indexed…
‘Store Now, Decrypt Later’: US Leaders Prep for Quantum Cryptography Concerns
U.S. cybersecurity leaders are focusing on preparing for the potential risks posed by quantum cryptography tools that could threaten critical infrastructure and national security. This article has been indexed from Cyware News – Latest Cyber News Read the original article:…
Cybercriminals Capitalize on Travel Industry’s Peak Season
Cequence Security found that cyberattacks against the travel industry surge during holidays, with 91% of severe vulnerabilities in the top 10 travel and hospitality sites enabling man-in-the-middle attacks. This article has been indexed from Cyware News – Latest Cyber News…
Employee Arrested for Locking Windows Admins Out of 254 Servers in Extortion Plot
The FBI investigation revealed that the suspect, Daniel Rhyne, had accessed the company’s systems without authorization and changed passwords for various accounts. Rhyne’s actions were intended to deny the company access to its systems and data. This article has been…
Third-Party Risk Management is Under the Spotlight
Third-party risk management is a critical issue in the wake of the CrowdStrike IT outage, revealing vulnerabilities within financial institutions related to supply chain resilience, especially in vital sectors like financial services. This article has been indexed from Cyware News…
UK Labour Party Reprimanded Over Cyberattack Backlog by Privacy Regulator
More than 150 people filed complaints to the Information Commissioner’s Office (ICO) regarding the delay in responding to subject access requests (SARs) after the cyberattack in October 2021. This article has been indexed from Cyware News – Latest Cyber News…
Report: Ransomware Attacks on US Schools and Colleges Cost $9.45 Billion
Over the last few years, ransomware attacks have become a major concern for schools and colleges in the US, with an average of $500,000 being lost per day due to downtime from these attacks, according to Comparitech. This article has…
Manufacturing Sector Under Fire From Microsoft Credential Thieves
The spear-phishing emails impersonate reputable companies like Periscope Holdings and R.S. Hughes, prompting victims to surrender their Microsoft credentials by clicking on a file attachment. This article has been indexed from Cyware News – Latest Cyber News Read the original…