Tag: EN

The Surge of FakeBat Malware in Search-Based Malvertising Campaigns

  In recent months, cybersecurity researchers have observed a concerning surge in search-based malvertising campaigns, with documented incidents nearly doubling compared to previous periods. Amidst this uptick in online threats, one particular malware variant has captured the attention of experts:…

International Initiative Targets Cybercrime

  The Cybercrime Atlas initiative has shifted into its operational phase in 2024, marking a significant milestone in global cybersecurity efforts. Originating from discussions at the RSA Conference two years prior, the initiative aims to dismantle cybercriminal networks by mapping…

Change Healthcare Detects Ransomware Attack Vector

  The cyberattack’s widespread destruction underscores how threat actors can do significant damage by targeting a relatively unknown vendor that serves a vital operational function behind the scenes. The AlphV ransomware group disrupted basic operations to the critical systems of…

Hackers Trick Users to Install Malware Via Weaponized PDF

In a sophisticated cyberattack campaign, malicious actors impersonating Colombian government agencies target individuals across Latin America. The attackers are distributing emails containing PDF attachments, falsely accusing recipients of traffic violations or other legal infractions. These deceptive communications are designed to…

Kubernetes Vulnerability Let Attackers Take Full System Control

A new vulnerability, CVE-2023-5528, has been discovered with Kubernetes. This vulnerability is associated with a command injection vulnerability that leads to remote code execution with SYSTEM-level privileges on the compromised Windows node. The severity for this vulnerability has been given…

OpenCTI: OSINT Platform to SOC & MDR Teams for Malware Analysis

ANY.RUN now integrates with OpenCTI, a cyber threat intelligence platform that allows automatic enrichment of OpenCTI observations with malware data directly from ANY.RUN analysis.  Users can access indicators like TTPs, hashes, IPs, and domains without manual data source checks.  The…

Cybersecurity Trends: Shaping the Future Landscape

Amidst the shadows of cyber threats lies an unseen world of clandestine developments – are you ready to uncover the secrets that will shape the future of cybersecurity? The post Cybersecurity Trends: Shaping the Future Landscape appeared first on Security…