The activity level of ransomware groups with “black” in their name has varied greatly over the early months of the new year. Despite the significant increase in attacks caused by the BlackLock ransomware group, the long-established Black Basta ransomware…
Silver Fox APT Uses Winos 4.0 Malware in Cyber Attacks Against Taiwanese Organizations
A new campaign is targeting companies in Taiwan with malware known as Winos 4.0 as part of phishing emails masquerading as the country’s National Taxation Bureau. The campaign, detected last month by Fortinet FortiGuard Labs, marks a departure from previous…
Wordfence Intelligence Weekly WordPress Vulnerability Report (February 17, 2025 to February 23, 2025)
📢 Did you know Wordfence runs a Bug Bounty Program for all WordPress plugins and themes at no cost to vendors? Researchers can earn up to $31,200 per vulnerability, for all in-scope vulnerabilities submitted to our Bug Bounty Program! Find…
SIGNAL denies access to user data in Sweden, reverse of what Apple has done
SIGNAL, the encrypted messaging platform based in California, USA, has made a significant announcement regarding its plans to exit Sweden. The reason for this decision stems from the Swedish government’s demands for access to a backdoor into the platform, allowing…
Fortifying the Nation’s Cybersecurity Posture in a New Administration
Cybersecurity and resilience have grown in priority for both the public and private sectors as threat surfaces reach unprecedented scales and threat actors gain new capabilities. The growing scale and complexity of cyber-attacks not only pose a threat to national…
Criminal group UAC-0173 targets the Notary Office of Ukraine
CERT-UA warns of UAC-0173 using DCRat malware to target Ukrainian notaries in a new attack wave since mid-January 2025. The Computer Emergency Response Team of Ukraine (CERT-UA) warned of a new campaign by criminal group UAC-0173 targeting Ukrainian notaries with…
Stopping CovertCatch – Securing Against Weaponized Job Offers
The post Stopping CovertCatch – Securing Against Weaponized Job Offers appeared first on Votiro. The post Stopping CovertCatch – Securing Against Weaponized Job Offers appeared first on Security Boulevard. This article has been indexed from Security Boulevard Read the original…
A Comprehensive Look at OSINT
Leveraging Publicly Available Data for Better Security Open Source Intelligence (OSINT) is a term you’ve likely encountered in conversations about cybersecurity, intelligence gathering, and investigative journalism. As our personal and professional lives become increasingly digital, OSINT has become a crucial…
For Unbiased Evaluation, Take on Real-World Security Testing
For organizations that are evaluating security controls, independent testing offers an unvarnished assessment of integrity and performance, of effectiveness. The post For Unbiased Evaluation, Take on Real-World Security Testing appeared first on Security Boulevard. This article has been indexed from…
Winos 4.0 Malware Targets Taiwan With Email Impersonation
Winos 4.0 malware uses phishing emails to target organizations in Taiwan, Fortinet experts warn This article has been indexed from www.infosecurity-magazine.com Read the original article: Winos 4.0 Malware Targets Taiwan With Email Impersonation
WordPress Admins Warned of Fake Plugins Injecting Malicious Links into Websites
A new wave of cyberattacks targeting WordPress websites has been uncovered, with attackers leveraging fake plugins to inject malicious links into site footers. These links, often promoting casino-related spam, compromise website integrity and can severely impact search engine optimization (SEO).…
New Anubis Ransomware Targets Windows, Linux, NAS, and ESXi x64/x32 Environments
A new ransomware group, dubbed Anubis, has emerged as a significant threat in the cybersecurity landscape. Active since late 2024, Anubis employs advanced techniques and operates across multiple platforms, including Windows, Linux, NAS, and ESXi environments. The group is leveraging…
VS Code Extension with 9 Million Installs Attacks Developers with Malicious Code
Microsoft has removed two widely-used Visual Studio Code (VS Code) extensions, “Material Theme Free” and “Material Theme Icons Free,” from its marketplace after cybersecurity researchers discovered malicious code embedded within them. These extensions, developed by Mattia Astorino (also known as…
Beware of Fake Cybersecurity Audits: Cybercriminals Use Scams to Breach Corporate Systems
Companies are being warned that malicious hackers are using a novel technique to break into businesses – by pretending to offer audits of the company’s cybersecurity. With ransomware and other cybersecurity threats high in the mind of many business owners,…
FBI says North Korea ‘responsible’ for $1.4 billion Bybit heist
The U.S. government law enforcement agency said a North Korean government hacking group it calls TraderTraitor was behind the massive hack of Bybit. © 2024 TechCrunch. All rights reserved. For personal use only. This article has been indexed from Security…
Countries and companies are fighting at the expense of our data privacy
While countries and companies are fighting over access to encrypted files and chats, our data privacy may get crushed. This article has been indexed from Malwarebytes Read the original article: Countries and companies are fighting at the expense of our…
Agentic AI and software development: Here’s how to get ahead of rising risk
As technology leadership pushes ever harder to deeply embed AI agents into software development lifecycles — in some cases, even using agentic AI to replace midlevel developers — application security (AppSec) is about to go from complex to a lot…
Microsoft Defender Leverages Machine Learning to Block Malicious Command Executions
The modern cybersecurity landscape is witnessing an unprecedented surge in sophisticated attack techniques, with adversaries increasingly exploiting legitimate command-line tools to execute malicious actions. To address this evolving threat, Microsoft Defender for Endpoint has enhanced its capabilities to detect and…
RustDoor and Koi Stealer Malware Attack macOS to Steal Login Credentials
A new wave of sophisticated cyberattacks targeting macOS systems has been identified, involving two malware strains, RustDoor and Koi Stealer. These attacks, attributed to North Korea-linked Advanced Persistent Threat (APT) groups, primarily aim at stealing sensitive login credentials and cryptocurrency…
LARVA-208 Hackers Compromise 618 Organizations Stealing Logins and Deploying Ransomware
A newly identified cybercriminal group, LARVA-208, also known as EncryptHub, has successfully infiltrated 618 organizations globally since June 2024, leveraging advanced social engineering techniques to steal credentials and deploy ransomware. According to reports from cybersecurity firms CATALYST and Prodaft, the…
TechCrunch Disrupt 2025: Just 2 days left to save up to $1,130
Clock’s ticking! You’ve got just 48 hours left to lock in your spot at TechCrunch Disrupt 2025 and save up to $1,130 on individual ticket types or 30% on group tickets. Don’t wait — secure your pass now before prices…
Winos 4.0 Spreads via Impersonation of Official Email to Target Users in Taiwan
FortiGuard Labs uncovers an attack targeting companies in Taiwan with WinOS4.0 that spreads via official email impersonation. Learn more. This article has been indexed from Fortinet Threat Research Blog Read the original article: Winos 4.0 Spreads via Impersonation of…
OpenSSF Released Security Baseline for Linux Projects
The Open Source Security Foundation (OpenSSF) has launched the Open Source Project Security Baseline (OSPS Baseline), a tiered framework designed to standardize security practices for Linux and other open-source projects. This initiative, aligned with global cybersecurity regulations like the EU…
Yodobashi Camera Users Under Attack from a New Wave of Phishing Attack
A new wave of phishing attacks impersonating Japanese electronics retail giant Yodobashi Camera has emerged, leveraging urgency and brand trust to steal customer credentials. Cybersecurity firm Symantec reported the campaign, which uses emails titled “Yodobashi.com: ‘Customer Information’ Change Request Notification”…