The extension round was led by existing investors Accel, Cyberstarts, and Sequoia Capital, along with private investors. Oasis has now raised a total of $75 million, including its seed round and previous Series A. This article has been indexed from…
Category: Cyware News – Latest Cyber News
AI is Creating a New Generation of Cyberattacks
Most businesses see offensive AI fast becoming a standard tool for cybercriminals, with 93% of security leaders expecting to face daily AI-driven attacks, according to Netacea. This article has been indexed from Cyware News – Latest Cyber News Read the…
US Warns of Russian Hackers Targeting Operational Technology in Water Systems
The alert says that water operators are employing poor security standards that have allowed the hackers to breach their networks, including the use of default passwords that are included when the water system management tools are first installed. This article…
Iranian Hackers Impersonate Journalists in Social Engineering Campaign
A hacking group linked to the intelligence wing of Iran’s Revolutionary Guard Corps impersonated journalists and human rights activists as part of a social engineering campaign, according to research released Wednesday by Mandiant and Google Cloud. This article has been…
Corelight Gets $150M to Expand Detection, Improve Workflows
The latest investment will allow Corelight to deepen its relationship with existing partners, while extending its expertise from large enterprises and government entities to the enterprise sector. This article has been indexed from Cyware News – Latest Cyber News Read…
Island Raises $175 Million at $3 Billion Valuation
The $175 million Series D funding round for Island was led by new investor Coatue and existing investor Sequoia Capital, with additional funding from other existing investors. This article has been indexed from Cyware News – Latest Cyber News Read…
New Cuttlefish Malware Infects Routers to Monitor Traffic for Credential Theft
Black Lotus Labs says the malware has been active since at least July 2023. It is currently running an active campaign concentrated in Turkey, with a few infections elsewhere impacting satellite phone and data center services. This article has been…
CISA Unveils Guidelines for AI and Critical Infrastructure
The CISA on Monday released safety and security guidelines for critical infrastructure, a move that comes just days after the Department of Homeland Security announced the formation of a safety and security board focused on the same topic. This article…
New Wpeeper Android Malware Hides Behind Hacked WordPress Sites
A new Android backdoor malware named ‘Wpeeper’ has been spotted in at least two unofficial app stores mimicking the Uptodown App Store, a popular third-party app store for Android devices with over 220 million downloads. This article has been indexed…
Programming Language R Patches Code Execution Security Flaw
The vulnerability, tagged CVE-2024-27322, can be exploited by tricking someone into loading a maliciously crafted RDS (R Data Serialization) file into an R-based project, or by fooling them into integrating a poisoned R package into a code base. This article…
Patched Deserialization Flaw in Siemens Product Allows RCE
Researchers detailed a deserialization vulnerability in Siemens software used to monitor industrial energy consumption and attributed the flaw to the German conglomerate’s decision to use a programming method that has known security risks. This article has been indexed from Cyware…
New Latrodectus Malware Attacks Use Microsoft, Cloudflare Themes
Latrodectus malware is now being distributed in phishing campaigns using Microsoft Azure and Cloudflare lures to appear legitimate while making it harder for email security platforms to detect the emails as malicious. This article has been indexed from Cyware News…
Belarus Secret Service Website Still Down After Hackers Claim the Breach
The hackers, known as the Belarusian Cyber-Partisans, announced their operation against the KGB late last week. The agency has not commented on the attack, but on Monday its website says that it is “in the process of development.” This article…
Microsoft Releases New-Open Source Tool for OT Security
Microsoft has released a new open-source security tool to close gaps in threat analysis for industrial control systems and help address increased nation-state attacks on critical infrastructure. This article has been indexed from Cyware News – Latest Cyber News Read…
Researchers Discover Coordinated Attacks on Docker Hub to Plant Millions of Malicious Repositories
Of the 4.79 million imageless Docker Hub repositories uncovered, 3.2 million of them are said to have been used as landing pages to redirect unsuspecting users to fraudulent sites as part of three broad campaigns. This article has been indexed…
KnowBe4 to Acquire Egress
KnowBe4, a Tampa Bay, FL-based provider of security awareness training and simulated phishing platform, is to acquire Egress Software Technologies, a London, UK-based company that specializes in adaptive and integrated cloud email security. This article has been indexed from Cyware…
Researchers Unveil Novel Attack Methods Targeting Intel’s Conditional Branch Predictor
Researchers have found two novel types of attacks that target the conditional branch predictor found in high-end Intel processors, which could be exploited to compromise billions of processors currently in use. This article has been indexed from Cyware News –…
Prompt Fuzzer: Open-Source Tool for Strengthening GenAI Apps
Prompt Fuzzer is interactive and user-friendly, allowing users to repeat the process as many times as needed to harden their system prompts and see their security score increase as the prompt becomes more resilient. This article has been indexed from…
UK Enacts IoT Cybersecurity Law
The Product Security and Telecommunications Infrastructure (PSTI) Act has come into effect, requiring manufacturers of consumer-grade IoT products sold in the UK to stop using guessable default passwords and have a vulnerability disclosure policy. This article has been indexed from…
Muddling Meerkat Hackers Manipulate DNS Using China’s Great Firewall
Discovered by Infoblox, the threat activity does not have a clear goal or motivation but demonstrates sophistication and advanced capabilities to manipulate global DNS systems. This article has been indexed from Cyware News – Latest Cyber News Read the original…