Crooks stole at least $69 million from Singapore-based cryptocurrency platform Phemex in an alleged cyberattack. Singapore-based crypto platform Phemex paused operations after a cyberattack that resulted in the theft of $69M. Phemex CEO Federico Variola stated they are restoring withdrawals and…
Category: EN
British Museum says ex-contractor ‘shut down’ IT systems, wreaked havoc
Former freelancer cuffed a week after being dismissed by UK’s top visitor attraction The British Museum was forced to temporarily close some galleries and exhibitions this weekend after a disgruntled former tech contractor went rogue and shuttered some onsite IT…
ByteDance In Talks With US Over Non-Sale Options For TikTok
ByteDance board member William Ford expresses optimism ByteDance can find non-sale option to keep TikTok in US in compliance with law This article has been indexed from Silicon UK Read the original article: ByteDance In Talks With US Over Non-Sale…
Crypto Firms Sign Up To Trump-Linked Lobby Group
Several cryptocurrency companies, including the companies behind Kraken and Blockchain.com as well as Ripple Labs, are amongst the dozens of enterprises and wealthy individuals who have retained Ballard Partners, a lobbying firm linked to US president Donald Trump, since his…
New SCAVY Framework to Detect Memory Corruption Privilege Escalation in Linux Kernel
A breakthrough framework named SCAVY has been introduced to proactively detect memory corruption targets that could potentially lead to privilege escalation in the Linux kernel. Presented at the prestigious USENIX Security Symposium in August 2024, the framework aims to address long-standing gaps…
Windows Charset Conversion Feature Exploited to Execute Remote Code
Security researchers have uncovered a critical vulnerability in Windows stemming from its “Best-Fit” character conversion feature, which has been exploited to execute remote code. This newly identified attack surface, dubbed “WorstFit,” leverages certain features of Windows’ internal character encoding system…
Critical Fleet Server Vulnerability Exposes Sensitive Information
A critical vulnerability (CVE-2024-52975) has been identified in Elastic’s Fleet Server, posing a severe risk of sensitive information exposure. The flaw, affecting Fleet Server versions 8.13.0 through 8.15.0, allows sensitive data to be logged at the INFO and ERROR log…
GamaCopy Mimics Gamaredon Tactics in Cyber Espionage Targeting Russian Entities
A previously unknown threat actor has been observed copying the tradecraft associated with the Kremlin-aligned Gamaredon hacking group in its cyber attacks targeting Russian-speaking entities. The campaign has been attributed to a threat cluster dubbed GamaCopy, which is assessed to…
When Hackers Get Hacked: Cyber Security Today for January 27, 2025
Cybersecurity Recap: Major Data Breaches, Transparency Issues, and a Twist on Script Kiddies In this episode of Cybersecurity Today, host Jim Love covers various major cybersecurity incidents and developments. Mozilla criticizes the auto industry’s data privacy practices following a Volkswagen…
Trump Executive Order Sets Out Pro-Crypto Policy Shift
US president Donald Trump signs executive order initiating wide-ranging shift to cryptocurrency-friendly policies This article has been indexed from Silicon UK Read the original article: Trump Executive Order Sets Out Pro-Crypto Policy Shift
Hackers Using RID Hijacking Technique To Create Secret Windows Admin Account
The North Korean-linked Andariel hacking group has been identified using a sophisticated attack campaign that employs the Relative Identifier (RID) technique to covertly create hidden administrator accounts on Windows systems. This deceptive technique enables attackers to avoid traditional detection measures…
Hackers Tool 11 Days To Deploy LockBit Ransomware From Initial Compromise
Threat actors demonstrated a methodical approach in a recent cyberattack, taking 11 days from initial compromise to fully deploy LockBit ransomware across a victim’s network. The incident, detailed in a report by The DFIR Report, showcases the evolving tactics of…
GitLab Security Update – Patch for XSS Vulnerability in File Rendering
GitLab has released critical security updates for its Community Edition (CE) and Enterprise Edition (EE), addressing several vulnerabilities, including a high-severity cross-site scripting (XSS) flaw. The patched versions, 17.8.1, 17.7.3, and 17.6.4, are now available, and GitLab strongly recommends all…
A week in security (January 20 – January 26)
Last week on Malwarebytes Labs: Last week on ThreatDown: Stay safe! This article has been indexed from Malwarebytes Read the original article: A week in security (January 20 – January 26)
CISA Board closed, UnitedHealth numbers rise, Llama’s LLM vulnerability
DHS Advisory Committee memberships halted UnitedHealth updates number of data breach victims to 190 million Meta’s Llama Framework flaw exposes AI systems to remote code execution risks Huge thanks to our sponsor, Conveyor Conveyor launched the first AI Agent for…
A Strategic Approach to Container Security
Containerization technologies have transformed how applications are built, deployed, and managed. From speeding up production cycles to enabling seamless scalability, they have become the backbone of mission-critical enterprise applications. Gartner predicts that by 2027, 90% of global organizations will run…
Researchers Exploited Windows Charset Conversion Feature to Execute Remote Code
Researchers have exposed a systemic vulnerability within the Windows operating system, leveraging its “Best-Fit” charset conversion feature to bypass security checks and execute remote code. The findings highlight widespread implications across various applications, with real-world exploitation scenarios impacting widely used…
MintsLoader Delivers StealC Malware and BOINC in Targeted Cyber Attacks
Threat hunters have detailed an ongoing campaign that leverages a malware loader called MintsLoader to distribute secondary payloads such as the StealC information stealer and a legitimate open-source network computing platform called BOINC. “MintsLoader is a PowerShell based malware loader…
Gravy Analytics Breach, Subaru Starlink Vulnerability Exposed
In this episode, we discuss the latest issues with data brokers, focusing on a breach at Gravy Analytics that leaked 30 million location data points online. We also explore a vulnerability in Subaru’s Starlink system that allows unrestricted access to…
Protection Against Deepfake Cyber Threats: Navigating the Future of Digital Security
The rise of deepfakes, artificial media that use AI to create hyper-realistic yet entirely fabricated images, videos, or audio, has created a new wave of cyber threats. While the technology behind deepfakes offers creative and entertainment potential, it has also…