Threat actors are actively exploiting a critical flaw in the Atlassian Confluence Data Center and Confluence Server in cryptocurrency mining campaigns. The critical vulnerability CVE-2023-22527 (CVSS score 10.0) in the Atlassian Confluence Data Center and Confluence Server is being actively…
Category: EN
New Tickler Malware Used to Backdoor US Government, Defense Organizations
APT33 used the new Tickler malware to infiltrate government and defense organizations in the US and the UAE. The group, known as Peach Sandstorm and Refined Kitten, is linked to the Iranian Revolutionary Guard Corps. This article has been indexed…
What is a QR Code Scam?
Bad actors are always on the lookout for ways to scam people. They would do anything that could trick potential victims into sharing sensitive information.… The post What is a QR Code Scam? appeared first on Panda Security Mediacenter. This…
Attackers Spread Lumma Stealer Malware GitHub Comments
Cybercriminals are leveraging platforms like GitHub to spread the Lumma information stealer malware. This sophisticated threat is part of a growing trend where attackers use legitimate services to distribute malicious tools, posing significant risks to users worldwide. What is Lumma…
The top 10 most-searched data security terms in the US: Can you define them?
As the number of data breaches soars, people are trying to become more educated about their sensitive data. Here’s what they’re searching for. This article has been indexed from Latest stories for ZDNET in Security Read the original article: The…
2 Men From Europe Charged With ‘Swatting’ Plot Targeting Former US President and Members of Congress
A former US president and several members of Congress were targets of a plot carried out by two European men to intimidate and threaten dozens of people by calling in bogus reports of police emergencies at their homes. The post…
Hackers Exploited Digital Advertising Tools to Launch Malicious Campaigns
Cybersecurity researchers from Mandiant and Google Cloud have uncovered a sophisticated scheme where hackers exploit digital advertising tools to conduct malicious campaigns. These tools, originally designed to enhance marketing efforts, have been repurposed by threat actors to evade detection and…
DMARC Deployment Phases: What to Expect and How to Prepare
Reading Time: 6 min Master DMARC deployment in 5 steps. Learn to configure SPF/DKIM, analyze reports, and gradually enforce policies. The post DMARC Deployment Phases: What to Expect and How to Prepare appeared first on Security Boulevard. This article has…
Accenture expands partnership with Google Cloud to boost AI adoption and cybersecurity
Accenture and Google Cloud announced that their strategic alliance is advancing solutions for enterprise clients and seeing strong momentum across industries in two critical and related areas: GenAI and cybersecurity. As part of the announcement today, the two companies are…
Hackers Repeatedly Using Same iOS & Chrome Exploits to Attack Government Websites
Hackers have been exploiting vulnerabilities in iOS and Google Chrome to target government websites, particularly in Mongolia. Google’s Threat Analysis Group (TAG) observed these attacks, which have been linked to the Russian government-backed actor APT29. The hackers have repeatedly used…
US Election-Themed Phishing Scams Rely on Fake Donation Sites
The domain actsblue[.]com is posing as the legitimate actblue[.]com, a platform for Democratic Party donations. The malicious site is registered anonymously with Namecheap, making it difficult to trace back to the threat actors. This article has been indexed from Cyware…
Buffer Overflow Flaw in TP-Link Routers Opens Door to RCE
A critical vulnerability, CVE-2024-42815, with a CVSS score of 9.8, has been discovered in TP-Link RE365 V1_180213 series routers, allowing for remote exploitation and potential takeover. This article has been indexed from Cyware News – Latest Cyber News Read the…
Atlassian Confluence Vulnerability Exploited in Crypto Mining Campaigns
Threat actors are actively exploiting a now-patched, critical security flaw impacting the Atlassian Confluence Data Center and Confluence Server to conduct illicit cryptocurrency mining on susceptible instances. “The attacks involve threat actors that employ methods such as the deployment of…
New Cyberattack Targets Chinese-Speaking Businesses with Cobalt Strike Payloads
Chinese-speaking users are the target of a “highly organized and sophisticated attack” campaign that is likely leveraging phishing emails to infect Windows systems with Cobalt Strike payloads. “The attackers managed to move laterally, establish persistence and remain undetected within the…
SANS Institute Unveils Critical Infrastructure Strategy Guide for 2024: A Call to Action for Securing ICS/OT Environments
A comprehensive guide authored by Dean Parsons emphasizes the growing need for specialized ICS security measures in the face of rising cyber threats. With a staggering 50% increase in ransomware attacks targeting industrial control systems (ICS) in 2023, the SANS…
North Korean Hackers Target Developers with Malicious npm Packages
Threat actors with ties to North Korea have been observed publishing a set of malicious packages to the npm registry, indicating “coordinated and relentless” efforts to target developers with malware and steal cryptocurrency assets. The latest wave, which was observed…
Deepfake Scams, Fake Global Protect Malware, and Russian Threats:Cybersecurity Today: for Friday, August 30th, 2024
In this episode of Cybersecurity Today, host Jim Love dives into the alarming rise of deepfake scams, highlighting how threat actors are using AI-generated videos to lure victims into fraudulent schemes. A notable campaign involves deepfake videos of Elon Musk…
Palo Alto Networks found to spread Malware
Palo Alto Networks is currently being misused as a cover for malware distribution. Although the California-based cybersecurity company is not involved in these activities, hackers are exploiting the company’s name to propagate malware disguised as the ‘Palo Alto Networks Global…
How Ransomware Is Evolving into a Geopolitical Weapon
In recent years, ransomware attacks have evolved from mere cyber-criminal activities into sophisticated tools of geopolitical maneuvering. As the digital landscape continues to expand, ransomware has emerged not just as a method of financial extortion but as a potent geopolitical…
Russia-linked APT29 reused iOS and Chrome exploits previously developed by NSO Group and Intellexa
Russia-linked APT29 group was spotted reusing iOS and Chrome exploits previously developed by surveillance firms NSO Group and Intellexa. Google TAG (Threat Analysis Group) researchers observed the Russia-linked group APT29 (aka SVR group, BlueBravo, Cozy Bear, Nobelium, Midnight Blizzard, and The Dukes). using exploits previously used…