The ScrubCrypt obfuscation tool has been discovered to be utilized in attacks to disseminate the RedLine Stealer malware, and its new variant was being marketed in underground communities. Threat actors use the ScrubCrypt obfuscation tool to help them avoid detection by antivirus software and initiate attacks that might…
Tag: EN
Fortanix launches Key Insight, a new tool for managing your enterprise’s encryption keys
Organizations can see which encryption keys and attached services/applications and users show evidence of increased risk, anomalous behavior. This article has been indexed from Security News | VentureBeat Read the original article: Fortanix launches Key Insight, a new tool for…
CISA adds ownCloud and Google Chrome bugs to its Known Exploited Vulnerabilities catalog
US CISA added ownCloud and Google Chrome vulnerabilities to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added ownCloud and Google Chrome vulnerabilities to its Known Exploited Vulnerabilities (KEV) catalog. The two issues are: CVE-2023-6345 – The CVE-2023-5217 is…
US Sanctions North Korean Cyberespionage Group Kimsuky
The US has announced sanctions against North Korean cyberespionage group Kimsuky over its intelligence gathering activities. The post US Sanctions North Korean Cyberespionage Group Kimsuky appeared first on SecurityWeek. This article has been indexed from SecurityWeek RSS Feed Read the…
New ‘Turtle’ macOS Ransomware Analyzed
New Turtle macOS ransomware is not sophisticated but shows that cybercriminals continue to target Apple devices. The post New ‘Turtle’ macOS Ransomware Analyzed appeared first on SecurityWeek. This article has been indexed from SecurityWeek RSS Feed Read the original article:…
Navigating Rogue Waves; Balancing Privacy and Security
This Article Navigating Rogue Waves; Balancing Privacy and Security was first published on Signpost Six. | https://www.signpostsix.com/ Introduction In 2013, Edward Snowden leaked over 200,000 classified National Security Agency documents concerning widespread government surveillance practices. This propelled a debate on…
Insider Risk Digest: Week 47-48
This Article Insider Risk Digest: Week 47-48 was first published on Signpost Six. | https://www.signpostsix.com/ Introduction Every two weeks, we bring you a round-up of cases and stories that caught our attention in the realm of Insider Risk. For weeks…
New Tool Set Found Used Against Middle East, Africa and the US
A new toolset comprised of malware (Agent Raccoon and Ntospy) and a custom version of Mimikatz (Mimilite) was used to target organizations in the U.S., Middle East and Africa. The post New Tool Set Found Used Against Middle East, Africa…
Critical Zyxel NAS vulnerabilities patched, update quickly!
Zyxel has patched six vulnerabilities affecting its network attached storage (NAS) devices, including several (OS) command injection flaws that can be easily exploited by unauthenticated attackers. The vulnerabilities in Zyxel NAS devices One of the six plugged security holes is…
Chinese Hackers Using SugarGh0st RAT to Target South Korea and Uzbekistan
A suspected Chinese-speaking threat actor has been attributed to a malicious campaign that targets the Uzbekistan Ministry of Foreign Affairs and South Korean users with a remote access trojan called SugarGh0st RAT. The activity, which commenced no later than August 2023,…
Qakbot Takedown Aftermath: Mitigations and Protecting Against Future Threats
The U.S. Department of Justice (DOJ) and the FBI recently collaborated in a multinational operation to dismantle the notorious Qakbot malware and botnet. While the operation was successful in disrupting this long-running threat, concerns have arisen as it appears that…
Pipidae – the latest malware to take over the Mac ecosystem
What is Pipidae? Recently, a wave of disturbing pop-up alerts that proclaim “Pipidae will damage… Pipidae – the latest malware to take over the Mac ecosystem on Latest Hacking News | Cyber Security News, Hacking Tools and Penetration Testing Courses.…
Google bins inactive accounts
Today marks the day when Google makes good on its new policy to reserve the right to delete inactive accounts after two years of inactivity. The company defines activity as “actions you take when you sign in or while you’re…
Simple Attack Allowed Extraction of ChatGPT Training Data
Researchers found that a ‘silly’ attack method could have been used to trick ChatGPT into handing over training data. The post Simple Attack Allowed Extraction of ChatGPT Training Data appeared first on SecurityWeek. This article has been indexed from SecurityWeek…
WhatsApp’s New Secret Code Feature Lets Users Protect Private Chats with Password
Meta-owned WhatsApp has launched a new Secret Code feature to help users protect sensitive conversations with a custom password on the messaging platform. The feature has been described as an “additional way to protect those chats and make them harder to find if someone…
Discover How Gcore Thwarted Powerful 1.1Tbps and 1.6Tbps DDoS Attacks
The most recent Gcore Radar report and its aftermath have highlighted a dramatic increase in DDoS attacks across multiple industries. At the beginning of 2023, the average strength of attacks reached 800 Gbps, but now, even a peak as high as 1.5+ Tbps is unsurprising.…
NCSC Urges UK Water Companies to Secure Control Systems
Guidance follows US incident involving Unitronics programmable logic controllers This article has been indexed from www.infosecurity-magazine.com Read the original article: NCSC Urges UK Water Companies to Secure Control Systems
Customers of online travel agency Booking.com are under attack
One of the largest online travel agencies in the world, Booking.com, has complained of customers being attacked by hackers. Even though the systems and networks… The post Customers of online travel agency Booking.com are under attack appeared first on Panda…
Hotel’s Booking.com Hacked Logins Let Attacker Steal Guest Credit Cards
According to a recent report by Secureworks, a well-planned and advanced phishing attack was carried out, specifically targeting hotels and their guests, through the popular website Booking.com. The attackers utilized a sophisticated phishing campaign to lure unsuspecting victims into providing…
IT threat evolution in Q3 2023. Mobile statistics
Mobile threat statistics for Q3 2023 include data on malware, adware, banking Trojans and ransomware for Android devices. This article has been indexed from Securelist Read the original article: IT threat evolution in Q3 2023. Mobile statistics