LockBit Ransomware Group Resurfaces with LockBit 4.0 Program Launch
The LockBit ransomware group, previously thought to be dismantled, has announced the launch of its LockBit 4.0 program, featuring advanced encryption and double-extortion tactics, set to debut on February 3, 2025.
View full story…
Surge in Ransomware Attacks Targets Industrial Sectors in Q3 2024
Cybersecurity firm Dragos reported a significant increase in ransomware activities during Q3 2024, involving 23 groups that exploited vulnerabilities in critical sectors such as manufacturing, healthcare, and financial services, with notable incidents including substantial ransom payments by CDK Global and Halliburton.
View full story…
Ukraine Faces Major Cyber-Attack Linked to Russian Military Intelligence
On December 19, Ukraine experienced a significant cyber-attack on its state registers, attributed to Russian military intelligence, coinciding with a missile assault on Kyiv, highlighting the ongoing cyber warfare between the two nations.
View full story…
Latest Cybernews
Fortinet Issues Urgent Patches for Critical Vulnerabilities in FortiWLM and FortiManager
Fortinet has released critical advisories and patches for significant vulnerabilities in its FortiWLM and FortiManager products that could allow remote attackers to execute unauthorized code.
View full story…
Kaspersky Products Still Used by US Organizations Despite Ban
Despite a September 2024 ban due to national security concerns, Kaspersky products are still actively used by various US organizations, including 19 government agencies, highlighting challenges in enforcing technology restrictions.
View full story…
North Korean Hackers Steal Over $2.2 Billion in Cryptocurrency in 2024
In 2024, North Korean hackers significantly escalated their cryptocurrency theft operations, stealing over $2.2 billion, which accounted for more than half of global cryptocurrency thefts and marked a 102.88% increase from the previous year.
View full story…
Critical Apache Struts Vulnerability CVE-2024-53677 Under Active Exploitation
A critical vulnerability in the Apache Struts application framework, tracked as CVE-2024-53677, is being actively exploited, allowing attackers to perform remote code execution and posing significant risks to affected systems.
View full story…
Malware Threatens Engineering Workstations in Industrial Control Systems
Recent analyses reveal a growing threat from sophisticated malware, including the Ramnit worm and Chaya_003, targeting engineering workstations in industrial control systems, posing significant risks to critical infrastructure.
View full story…
Latest Cybernews
Surge in Phishing Attacks Driven by AI Sophistication in 2024
Phishing attacks have surged by over 200% in 2024, with credential phishing incidents increasing by 703%, largely due to the use of generative artificial intelligence that enhances the sophistication of cybercriminal tactics.
View full story…
Vishing Attack Exploits Microsoft Teams to Distribute DarkGate RAT
A sophisticated vishing attack utilized Microsoft Teams to deliver the DarkGate Remote Access Trojan, employing advanced social engineering tactics to gain remote access to victims’ systems.
View full story…
Russia Designates US Cybersecurity Firm Recorded Future as “Undesirable”
The Russian government has classified Recorded Future, a US-based cybersecurity company, as “undesirable,” leading to potential legal repercussions for its operations and affiliates in Russia amid ongoing geopolitical tensions.
View full story…
CISA Mandates Enhanced Cybersecurity Practices for Federal Cloud Services
The Cybersecurity and Infrastructure Security Agency (CISA) has issued Binding Operational Directive 25-01, requiring federal agencies to strengthen cybersecurity measures for Microsoft 365 environments in response to vulnerabilities exploited in recent cyberattacks.
View full story…
Surge in Malicious Campaigns Targeting VSCode Marketplace and npm Community
Recent supply chain attacks have exploited vulnerabilities in the VSCode Marketplace and npm community, with malicious packages and extensions impersonating trusted applications to compromise software development environments.
View full story…