Skuld Malware Using Weaponized Windows Utilities Packages To Deliver Malware

Researchers discovered a malware campaign targeting the npm ecosystem, distributing the Skuld info stealer through malicious packages disguised as legitimate tools. The threat actor, “k303903,” compromised hundreds of machines before the packages were removed.  Subsequent analysis revealed that “k303903” likely…

Sophos Patches Critical Firewall Vulnerabilities

Sophos has released patches for a critical-severity firewall vulnerability that could lead to remote code execution. The post Sophos Patches Critical Firewall Vulnerabilities appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original article: Sophos Patches…

Hackers Exploiting PLC Controllers In US Water Management System To Gain Remote Access

A joint Cybersecurity Advisory (CSA) warns of ongoing exploitation attempts by Iranian Islamic Revolutionary Guard Corps (IRGC)-affiliated cyber actors using the online persona “CyberAv3ngers.”  These actors are targeting and compromising Unitronics Vision Series programmable logic controllers (PLCs), specifically those manufactured…

Q3 2024 Cyber Attacks Statistics

I aggregated the statistics created from the cyber attacks timelines published in the third quarter of 2024. In this period, I collected… This article has been indexed from HACKMAGEDDON Read the original article: Q3 2024 Cyber Attacks Statistics

Amazon Workers Go On Strike Across US

Amazon staff in seven cities across US go on strike after company fails to negotiate, e-commerce giant says Christmas deliveries unaffected This article has been indexed from Silicon UK Read the original article: Amazon Workers Go On Strike Across US

The Invisible Russia-Ukraine Battlefield

In Russia’s war against Ukraine, electronic warfare, including signal-jamming, anti-drone weapons, and innovative protections for critical military systems, has become a key piece of the conflict. This article has been indexed from Security Latest Read the original article: The Invisible…

Cloud Atlas seen using a new tool in its attacks

We analyze the latest activity by the Cloud Atlas gang. The attacks employ the PowerShower, VBShower and VBCloud modules to download victims’ data with various PowerShell scripts. This article has been indexed from Securelist Read the original article: Cloud Atlas…

Top 10 Cybersecurity Trends to Expect in 2025

The 2025 cybersecurity landscape is increasingly complex, driven by sophisticated cyber threats, increased regulation, and rapidly evolving technology. In 2025, organizations will be challenged with protecting sensitive information for their customers while continuing to provide seamless and easy user experiences.…