Anetac, a startup protecting companies from blind spots of service accounts in hybrid environments, raised $16M in funding. The round was led by Liberty Global with participation from Shield Capital, GP Ventures, Anetac CEO Tim Eades and Jason Witty. This…
Tag: Cyware News – Latest Cyber News
NATO and the EU Formally Condemned APT28 Cyber Espionage
The nation-state actor APT28 exploited the zero-day flaw CVE-2023-23397 in attacks against European entities since April 2022. The Russia-linked APT also targeted NATO entities and Ukrainian government agencies. This article has been indexed from Cyware News – Latest Cyber News…
NiceCurl and TameCat Custom Backdoors Leveraged by Damselfly APT
The Damselfly Advanced Persistent Threat (APT) group, also known as APT42, has been actively using custom backdoor variants, NiceCurl and TameCat, to infiltrate Windows machines. This article has been indexed from Cyware News – Latest Cyber News Read the original…
HijackLoader Evolves with New Evasion Techniques
HijackLoader is a modular malware loader that is used to deliver second-stage payloads including Amadey, Lumma Stealer, Racoon Stealer v2, and Remcos RAT. HijackLoader decrypts and parses a PNG image to load the next stage. This article has been indexed…
Belgium’s Aikido Lands $17M Series A for its Security Platform Aimed at Developers
Aikido, a startup based in Ghent, Belgium, has secured a $17 million Series A funding to develop its innovative security platform tailored for developers. The round was led by Singular, with participation from Notion Capital and Connect Ventures. This article…
Russian GRU Hackers Compromised German, Czech Targets
The German and Czech governments have publicly disclosed that Russian military intelligence hackers, known as APT28, have been involved in an espionage campaign targeting political parties and critical infrastructure in both countries. This article has been indexed from Cyware News…
Organizations Patch CISA KEV List Bugs 3.5 Times Faster Than Others, Researchers Find
The median time to patch bugs listed in the CISA’s Known Exploited Vulnerabilities (KEV) catalog is 174 days, compared to 621 days for non-KEV vulnerabilities, according to an analysis by Bitsight. This article has been indexed from Cyware News –…
Finland Warns of Android Malware Attacks Breaching Bank Accounts
Finland’s Transport and Communications Agency (Traficom) highlighted multiple cases of SMS messages written in Finnish that instruct recipients to call a number. The scammer answers the call instructs victims to install a McAfee app for protection. This article has been…
Law Enforcement Seized LockBit Group’s Website Again
Law enforcement authorities seized the Lockbit group’s Tor website again and they plan to reveal the identities of the LockBitSupps and other gang members on May 7, 2024. This article has been indexed from Cyware News – Latest Cyber News…
Ransom Recovery Costs Reach $2.73 Million
Ransom recovery costs have surged, with the average payment reaching $2 million, a 500% increase from the previous year. Excluding ransoms, the average cost of recovery has risen to $2.73 million, up by almost $1 million, according to Sophos. This…
LayerX Raises $26 Million for its Browser Security Platform
The Israeli startup founded in 2022 by Or Eshed and David Weisbrot has raised $26 million in Series A funding. This round, led by Glilot+ and with participation from Dell Technologies Capital, brings LayerX’s total investment to $34 million. This…
Microsoft, Google Widen Passkey Support for Its Users
Passkeys are gaining widespread adoption as an alternative to traditional passwords for digital authentication. Major tech companies like Microsoft, Google, and Bitwarden have recently expanded support for passkeys. This article has been indexed from Cyware News – Latest Cyber News…
Cisa Warned 1,750 Organizations of Ransomware Vulnerabilities Last Year. Only Half Took Action.
The Cybersecurity and Infrastructure Security Agency sent out alerts to critical infrastructure sectors, with only 852 organizations responding by patching, implementing controls, or taking devices offline. This article has been indexed from Cyware News – Latest Cyber News Read the…
Russia-Linked APT28 and Crooks are Still Using the Moobot Botnet
Trend Micro researchers revealed that the botnet, primarily operating through compromised Ubiquiti EdgeRouters, is used for various malicious activities such as credential harvesting, proxying network traffic, and hosting phishing landing pages. This article has been indexed from Cyware News –…
European Raids Shut Down Call Centers Used to ‘Shock and Cheat’ Victims
The criminal network was responsible for defrauding thousands of victims through fake police calls, investment fraud, or romance scams, Europol said. Scam callers posed as victims’ close relatives, bank employees, customer service, or police. This article has been indexed from…
Crypto Recovery Scams – And How They Add Insult to Injury
Crypto recovery scams involve fraudsters who offer to help victims recover stolen cryptocurrency in exchange for an upfront fee, but instead, they disappear after payment. This article has been indexed from Cyware News – Latest Cyber News Read the original…
Ukraine Records Increase in Financially Motivated Attacks by Russian Hackers
These hackers are employing sophisticated phishing techniques to distribute malicious software and target financial theft, with incidents steadily increasing over the past two years. This article has been indexed from Cyware News – Latest Cyber News Read the original article:…
CISA Urges Software Devs to Weed out Path Traversal Vulnerabilities
Path traversal vulnerabilities, also known as directory traversal, can be exploited by attackers to manipulate critical files, compromise security mechanisms, access sensitive data, and disrupt systems. This article has been indexed from Cyware News – Latest Cyber News Read the…
Android Bug can Leak DNS Traffic With VPN Kill Switch Enabled
The Android bug discovered by a Mullvad VPN user reveals that Android devices can leak DNS queries even with the “Always-on VPN” feature and “Block connections without VPN” option enabled. This article has been indexed from Cyware News – Latest…
“Dirty Stream” Attack Affects Popular Android Apps
A vulnerability in popular Android apps like Xiaomi File Manager and WPS Office could allow malicious apps to overwrite files in the vulnerable app’s home directory, potentially leading to code execution and unauthorized access to user data. This article has…