Critical Vulnerability Discovered in Veeam Backup and Replication Software
Veeam’s backup and replication software is vulnerable to remote code execution threat, prompting the release of patches to address the issue.
View full story…
Vanilla Tempest Targets American Healthcare Organizations with INC Ransomware
Vanilla Tempest, a financially motivated threat actor, targets American healthcare organizations using the INC ransomware strain, causing disruptions and data loss at McLaren Health Care.
View full story…
Ransomware Attacks Surge in 2024 Due to Infostealer Malware and Digital Identity Exposure
Ransomware attacks have significantly increased in 2024, driven by infostealer malware and digital identity exposure, posing a threat to organizations’ cybersecurity measures.
View full story…
New Evidence of Ongoing TeamTNT Activity Discovered in 2023
Security researchers have found that TeamTNT is targeting vulnerable public instances of Redis, Kubernetes, and Docker, using SSH brute force attacks to compromise systems and deploy the “Diamorphine” rootkit for stealth and persistent access.
View full story…
Global Organizations Facing Billions in Losses from API and Bot Attacks
Study by Thales reveals significant financial losses due to rise in API adoption and AI-powered bot attacks.
View full story…
US Accuses Chinese Company of Operating Massive Botnet Network
Integrity Technology Group, also known as Flax Typhoon APT group, accused of running botnet targeting critical infrastructure and government agencies, exploiting vulnerabilities in Linux systems.
View full story…
Latest Cybernews
New Raptor Train IoT Botnet Discovered by Cybersecurity Researchers
Chinese state-sponsored botnet Raptor Train compromises over 200,000 IoT devices, poses significant cybersecurity risks
View full story…
Study Reveals 80% of Critical National Infrastructure Organizations Experienced Email Breaches
Recent report by OPSWAT and Osterman Research highlights prevalence of email-related security breaches in CNI companies, with phishing incidents, account compromises, and data leakage being common occurrences.
View full story…
Former Chinese Aerospace Engineer Indicted in US for Cyber Espionage
Former Aviation Industry Corporation of China employee Song Wu indicted for attempting to hack US government agencies and private aerospace companies to steal military software.
View full story…
Scammers Using Google Street View Images in New Sextortion Attacks
Scammers are targeting victims with threatening emails containing personal information and images of their home or workplace, demanding payment in bitcoin to prevent the release of stolen intimate photos or videos.
View full story…
Australian Federal Police Dismantle Global Criminal Syndicate Through Operation Kraken
Operation Kraken successfully infiltrated the encrypted communication platform Ghost, leading to the arrest of the mastermind and numerous individuals involved in criminal activities.
View full story…
CISA and FBI Issue Secure by Design Alert to Prevent XSS Vulnerabilities
CISA and the FBI emphasize the importance of secure coding practices to prevent cross-site scripting (XSS) vulnerabilities in software.
View full story…
Google Enhances Chrome Browser Safety Features for Data Protection and Online Threat Shielding
Google introduces new safety features for Chrome browser, including automatic Safety Check, permissions control, and one-time permissions for enhanced user privacy and security online.
View full story…
UNC2970 Cyber-Espionage Group Targets Critical Infrastructure Sectors with Job-Themed Phishing Lures
UNC2970, a cyber-espionage group linked to North Korea’s Reconnaissance General Bureau and associated with the Lazarus Group, has been conducting targeted attacks on victims in the energy, aerospace, and nuclear sectors using job-themed phishing lures.
View full story…