Five Charged in $11 Million Cryptocurrency Phishing Scheme Linked to Scattered Spider
Five individuals, including four US citizens and one British national, have been charged with conspiracy to commit wire fraud and aggravated identity theft for their roles in sophisticated phishing schemes that resulted in over $11 million in cryptocurrency theft.
View full story…
Lumma Stealer Malware Exploits Telegram for Widespread Distribution
Lumma Stealer, a sophisticated infostealer malware linked to Russian cybercriminals, is primarily distributed through Telegram channels, posing significant threats to user privacy and data security.
View full story…
Google’s AI-Powered Fuzzing Tool Uncovers Critical OpenSSL Vulnerability
Google’s OSS-Fuzz team has enhanced their AI-driven fuzzing tool, discovering 26 vulnerabilities, including a critical flaw in OpenSSL that has existed for nearly 20 years.
View full story…
Latest Cybernews
Apple Releases Emergency Security Updates for Critical macOS Vulnerabilities
Apple has issued emergency updates to address two critical zero-day vulnerabilities in macOS Sequoia, CVE-2024-44308 and CVE-2024-44309, which may have been actively exploited and affect a range of Apple devices.
View full story…
Ransomware Attacks Surge During Holidays and Weekends
Ransomware attackers are increasingly exploiting holidays and weekends to target organizations, taking advantage of reduced security staffing and resulting in a significant rise in incidents across various sectors.
View full story…
Five Critical Privilege Escalation Vulnerabilities Found in Ubuntu’s Needrestart Utility
Five critical Local Privilege Escalation vulnerabilities in the needrestart utility and libmodule-scandeps-perl package, discovered by Qualys, allow unprivileged users to gain root access on Ubuntu servers without user interaction.
View full story…
The Rise of Quishing: A New Cyber Threat Exploiting QR Codes
Quishing, a novel cyber threat that uses fraudulent QR codes in emails to bypass phishing security measures, poses significant risks as attackers increasingly target employees with deceptive links to phishing sites.
View full story…
U.S. Cybersecurity Agencies Face Critical Funding Challenges
Key U.S. cybersecurity agencies, including NIST and NVD, are significantly underfunded and understaffed, jeopardizing national security and economic stability.
View full story…
Liminal Panda: China-Linked APT Group Targets Telecommunications Providers
Liminal Panda, an advanced persistent threat group linked to China, has been conducting cyber espionage against telecommunications providers in Southeast Asia and Africa since 2020, utilizing sophisticated tools and techniques to collect sensitive data.
View full story…
Latest Cybernews
Ransomware Gangs Recruit Penetration Testers to Enhance Attacks
Cybercriminal groups are increasingly hiring penetration testers to improve the effectiveness of their ransomware operations, reflecting a trend towards the professionalization of cybercrime.
View full story…
Submarine Cable Damage in Baltic Sea Sparks Sabotage Fears
Recent damage to two submarine telecommunications cables in the Baltic Sea has raised suspicions of sabotage attributed to Russia, prompting investigations amid heightened geopolitical tensions.
View full story…
Emergence of Helldown Ransomware’s Linux Variant Targets VMware ESXi Servers
A new Linux variant of the Helldown ransomware has been identified, expanding its attacks from Windows systems to VMware ESXi servers and Linux environments, exploiting known vulnerabilities to infiltrate various industries.
View full story…
Cybersecurity Recovery Times Extend to 7.3 Months in 2024
Organizations are facing longer recovery times and increased costs from cybersecurity incidents, with average recovery periods now 25% longer than expected, highlighting the need for a more proactive and comprehensive approach to cybersecurity.
View full story…