The FortiGuard Labs team has discovered a malicious PyPI package that poses a significant risk to individuals and institutions by potentially leaking credentials and sensitive information. This article has been indexed from Cyware News – Latest Cyber News Read the…
Category: Cyware News – Latest Cyber News
Russia, Moldova Targeted by Obscure Hacking Group in New Cyberespionage Campaign
A cyberespionage group known as XDSpy targeted Russia and Moldova with new malware. The group sent phishing emails to Russian targets, including a tech company and an organization in Transnistria. This article has been indexed from Cyware News – Latest…
Inaugural Pentagon Cyber Policy Chief Nominee Sails Through Senate Armed Services Committee
The Senate Armed Services Committee has approved Michael Sulmeyer, the Army’s top digital adviser, as the inaugural assistant secretary of defense for cyber policy, paving the way for his nomination to the Senate floor for a vote. This article has…
Innovative Approach Promises Faster Bug Fixes
Birgit Hofer and Thomas Hirsch from TU Graz have developed a new approach to speed up software bug fixes. By identifying bottlenecks in fault localization, they created a scalable solution using NLP and metrics to analyze code for faults. This…
DigiCert Mass-Revoking TLS Certificates Due to Domain Validation Bug
DigiCert discovered a bug in how domain ownership was verified, leading to the mass revocation of SSL/TLS certificates. Approximately 0.4% of domain validations conducted between August 2019 and June 2024 are affected. This article has been indexed from Cyware News…
US Senate Passes Landmark Bill Protecting Children’s Online Safety and Privacy
The Kids Online Safety and Privacy Act (KOPSA) combines two bills to enhance protections for children under 17, prohibiting targeted advertising, requiring consent for data collection, and limiting exposure to harmful content. This article has been indexed from Cyware News…
Insecure File-Sharing Practices in Healthcare Put Patient Privacy at Risk
Healthcare organizations are jeopardizing patient privacy due to insecure file-sharing practices, according to a report by Metomic. The study found that 25% of publicly shared files in healthcare contain Personally Identifiable Information (PII). This article has been indexed from Cyware…
Ransomware Attack On Service Provider Hits 300 Small Banks Across India
The attack targeted C-Edge Technologies, a provider of banking systems for these banks. As a precaution, the National Payment Corporation of India (NPCI) has isolated these banks from the broader payment network to contain the attack. This article has been…
Some Companies Pay Ransomware Attackers Multiple Times, Survey Finds
Some companies are paying ransomware attackers multiple times, with more than a third not receiving the decryption keys or getting corrupted keys after paying, according to a survey by Semperis. This article has been indexed from Cyware News – Latest…
SMS Stealer Targeting Several Countries with Over 100,000 Malicious Android Apps
The malware was found monitoring OTP messages from over 600 global brands, with victims detected in 113 countries, including India, Russia, Brazil, Mexico, the U.S., Ukraine, Spain, and Turkey. This article has been indexed from Cyware News – Latest Cyber…
Secretive: Open-Source App for Storing and Managing SSH Keys in the Secure Enclave
Secretive is an open-source app that securely stores and manages SSH keys in the Secure Enclave for Macs. Storing keys in the Secure Enclave prevents copying or exporting by malicious users or malware, ensuring a higher level of security. This…
Microsoft Confirms Azure, 365 Outage Linked to DDoS Attack
Microsoft confirmed that an eight-hour outage on Tuesday affecting its Azure portal, Microsoft 365, and Microsoft Purview services was caused by a DDoS attack. The company mentioned that its response to the outage may have worsened the impact. This article…
Security Flaws at UK Elections Agency Left Door Open for Chinese Hackers, Privacy Watchdog Finds
The UK’s Electoral Commission was criticized by the Information Commissioner’s Office (ICO) for failing to protect the personal data of 40 million people from Chinese hackers in a cyberattack three years ago. This article has been indexed from Cyware News…
Apple Extends Zero-Day Patch to Older Macs, Urges Immediate Update
Apple has released a critical zero-day patch for older Macs running macOS Monterey 12.7.6, addressing an actively exploited vulnerability (CVE-2024-23296). The flaw in Apple’s RTKit real-time OS could allow unauthorized access to kernel memory. This article has been indexed from…
EvilProxy Phishing Kit Used in Over One Million Attacks Monthly
EvilProxy, known as the “LockBit of phishing,” is a popular phishing kit used in over a million attacks each month. It allows cybercriminals to launch ransomware infections, steal data, and compromise business emails. This article has been indexed from Cyware…
Lineaje Secures $20 Million in Funding To Address Software Supply Chain Issues
Lineaje has raised $20 million in a Series A funding round, led by Prosperity7 Ventures, Neotribe, and Hitachi Ventures, with Tenable Ventures also participating. This investment highlights the increasing demand for software supply chain security. This article has been indexed…
Beware of Fake AI Tools Masking a Very Real Malware Threat
Attackers disguise malicious tools as legitimate GenAI apps through phishing sites, web browser extensions, fake apps on mobile stores, and malicious ads on social media. This article has been indexed from Cyware News – Latest Cyber News Read the original…
Threat Actor Impersonates Google via Fake Ads for Authenticator
A threat actor recently impersonated Google through a fake ad for the Google Authenticator, a popular multi-factor authentication program. This resulted in innocent users unknowingly downloading malware or falling victim to phishing scams. This article has been indexed from Cyware…
Tycoon 2FA Phishing Kit Exploits Amazon SES to Steal User Credentials
The attack begins with emails from an Amazon SES client containing empty PDF attachments and a message from Docusign. Despite some checks failing, the emails can still appear legitimate due to the compromised source. This article has been indexed from…
Source Code of Phorpiex Botnet with Anti-AV Capabilities on Sale
The notorious Trik botnet, aka Phorpiex, is being sold in antivirus circles, offering advanced capabilities to evade detection. This C++ botnet includes modules such as a crypto clipper, a USB emitter, and a PE infector targeting crypto wallets. This article…