A recent investigation by Unit 42 of Palo Alto Networks has uncovered a sophisticated, state-sponsored cyberespionage operation, tracked as CL-STA-0048. The campaign targeted high-value organizations in South Asia, particularly a telecommunications company. Employing rare tactics and tools, the attackers leveraged…
Tag: EN
Hackers Impersonate Top Tax Firm with 40,000 Phishing Messages to Steal Credentials
Proofpoint researchers have identified a marked increase in phishing campaigns and malicious domain registrations designed to exploit tax filing season. These operations, targeting countries such as the UK, US, Switzerland, and Australia, leverage tax-related themes to dupe victims into divulging…
Arcus Media Ransomware Strikes: Files Locked, Backups Erased, and Remote Access Disabled
The cybersecurity landscape faces increasing challenges as Arcus Media ransomware emerges as a highly sophisticated threat. This Ransomware-as-a-Service (RaaS) operation, first observed in May 2024, has rapidly evolved, executing coordinated attacks that disrupt critical processes, encrypt data, and hinder recovery…
500 Million Proton VPN & Pass Users at Risk Due to Memory Protection Vulnerability
Proton, the globally recognized provider of privacy-focused services such as Proton VPN and Proton Pass, is facing scrutiny after the discovery of severe memory protection vulnerabilities in its products. Despite having established itself as a trusted name for safeguarding user…
Infrastructure Laundering: Blending in with the Cloud
In an effort to blend in and make their malicious traffic tougher to block, hosting firms catering to cybercriminals in China and Russia increasingly are funneling their operations through major U.S. cloud providers. Research published this week on one such…
DORA Compliance for MSPs – How to Help Your Clients
In January 2025, the European Union’s new Digital Operational Resilience Act (DORA) came into effect. If you’re an MSP and you have clients in the financial services sector, they will likely be turning to you for help with DORA compliance…
Backline Emerges From Stealth With $9M in Funding for Vulnerability Remediation Platform
Backline has emerged from stealth mode with an autonomous security remediation platform and $9 million in seed funding. The post Backline Emerges From Stealth With $9M in Funding for Vulnerability Remediation Platform appeared first on SecurityWeek. This article has been…
Google Blocked 2.36 Million Policy-Violating Apps
Google Play blocked 2.36 million policy-violating apps and banned 158,000 harmful developer accounts in 2024 This article has been indexed from www.infosecurity-magazine.com Read the original article: Google Blocked 2.36 Million Policy-Violating Apps
Microsoft Enhances Windows 11 Security with Admin Protection to Prevent Crowdstrike-Like Incident
Microsoft has introduced “Administrator Protection” (AP), a sophisticated security feature aimed at elevating Windows operating system security by redefining how administrative privileges are managed and reducing the risk of privilege escalation attacks. Detailed in its latest technical blog post, this…
Cerebras becomes the world’s fastest host for DeepSeek R1, outpacing Nvidia GPUs by 57x
Cerebras Systems launches DeepSeek’s R1-70B AI model on its wafer-scale processor, delivering 57x faster speeds than GPU solutions and challenging Nvidia’s AI chip dominance with U.S.-based inference processing. This article has been indexed from Security News | VentureBeat Read the…
New Android Malware Exploiting Wedding Invitations to Steal Victims WhatsApp Messages
A sophisticated Android malware campaign, dubbed Tria Stealer, has been targeting users in Malaysia and Brunei since mid-2024. The malware uses fake wedding invitations as a lure to trick victims into installing a malicious Android Package Kit (APK). Once installed,…
Cyber Insights 2025: Cyberinsurance – The Debate Continues
Better risk management could lead to reduced premiums on top of value for money, making cyberinsurance a silent driver for improved cybersecurity. The post Cyber Insights 2025: Cyberinsurance – The Debate Continues appeared first on SecurityWeek. This article has been…
Three Ways To Prevent Insider Threat Driven Data Leaks
The United States is poised to undergo a period of highly disruptive transformation. The incoming administration has promised to make significant changes, including forming a new body, the Department of Governmental Efficiency (DOGE), with the aim of substantially reducing…
Cybercrime forums Cracked and Nulled seized, operators arrested
Law enforcement from Germany, Australia, Spain, Greece, Romania, Italy, France and the USA have seized and shut down Cracked and Nulled, the two largest cybercrime forums in the world. The takedown notice (Source: German Federal Criminal Police Office) “The websites…
Google: Over 57 Nation-State Threat Groups Using AI for Cyber Operations
Over 57 distinct threat actors with ties to China, Iran, North Korea, and Russia have been observed using artificial intelligence (AI) technology powered by Google to further enable their malicious cyber and information operations. “Threat actors are experimenting with Gemini…
Seraphic Attracts $29M Investment to Chase Enterprise Browser Business
Seraphic Security banks $29 million investment as VCs remain bullish on startups with security-themed browsers for corporate defenders. The post Seraphic Attracts $29M Investment to Chase Enterprise Browser Business appeared first on SecurityWeek. This article has been indexed from SecurityWeek…
DataDome Expands GraphQL Protection Across 7 Integrations
DataDome now offers GraphQL support and protections across 7 popular integrations, ensuring robust cyberfraud protection without compromising performance. The post DataDome Expands GraphQL Protection Across 7 Integrations appeared first on Security Boulevard. This article has been indexed from Security Boulevard…
Doppler announces integration with Datadog to streamline security and monitoring
San Francisco, United States / California, 30th January 2025, CyberNewsWire The post Doppler announces integration with Datadog to streamline security and monitoring appeared first on Cybersecurity Insiders. This article has been indexed from Cybersecurity Insiders Read the original article: Doppler…
Attackers Increase Use of HTTP Clients for Account Takeovers
HTTP client tools used to compromise Microsoft 365 environments with 78% of tenants targeted in 2024 This article has been indexed from www.infosecurity-magazine.com Read the original article: Attackers Increase Use of HTTP Clients for Account Takeovers
How to deploy an Amazon OpenSearch cluster to ingest logs from Amazon Security Lake
January 30, 2025: This post was republished to make the instructions clearer and compatible with OCSF 1.1. Customers often require multiple log sources across their AWS environment to empower their teams to respond and investigate security events. In part one…