Category: Uncategorized
-
Microsoft security overhaul offers blueprint for SecOps
Post ContentRead More
-
North Korean Hackers Using New VeilShell Backdoor in Stealthy Cyber Attacks [email protected] (The Hacker News)
Threat actors with ties to North Korea have been observed delivering a previously undocumented backdoor and remote access trojan (RAT) called VeilShell as part of a campaign targeting Cambodia and likely other Southeast Asian countries. The activity, dubbed SHROUDED#SLEEP by Securonix, is believed to be the handiwork of APT37, which is also known as InkySquid,…
-
‘Defunct’ DOJ ransomware task force raises questions, concerns
Post ContentRead More
-
INTERPOL Arrests 8 in Major Phishing and Romance Fraud Crackdown in West Africa [email protected] (The Hacker News)
INTERPOL has announced the arrest of eight individuals in Côte d’Ivoire and Nigeria as part of a crackdown on phishing scams and romance cyber fraud. Dubbed Operation Contender 2.0, the initiative is designed to tackle cyber-enabled crimes in West Africa, the agency said. One such threat involved a large-scale phishing scam targeting Swiss citizens that…
-
Contact center monitoring: A step-by-step guide
Post ContentRead More
-
Cryptomining perfctl malware swarms Linux machines
Post ContentRead More
-
LockBit Ransomware and Evil Corp Leaders Arrested and Sanctioned in Joint Global Effort [email protected] (The Hacker News)
A new wave of international law enforcement actions has led to four arrests and the takedown of nine servers linked to the LockBit (aka Bitwise Spider) ransomware operation, marking the latest salvo against what was once a prolific financially motivated group. This includes the arrest of a suspected LockBit developer in France while on holiday…
-
Ivanti Endpoint Manager Flaw Actively Targeted, CISA Warns Agencies to Patch [email protected] (The Hacker News)
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Wednesday added a security flaw impacting Endpoint Manager (EPM) that the company patched in May to its Known Exploited Vulnerabilities (KEV) catalog, based on evidence of active exploitation. The vulnerability, tracked as CVE-2024-29824, carries a CVSS score of 9.6 out of a maximum of 10.0, indicating…
-
Zero-Day Breach at Rackspace Sparks Vendor Blame Game Ryan Naraine
A breach at Rackspace exposes the fragility of the software supply chain, triggering a blame game among vendors over an exploited zero-day. The post Zero-Day Breach at Rackspace Sparks Vendor Blame Game appeared first on SecurityWeek. Read More
-
Fake Trading Apps Target Victims Globally via Apple App Store and Google Play [email protected] (The Hacker News)
A large-scale fraud campaign leveraged fake trading apps published on the Apple App Store and Google Play Store, as well as phishing sites, to defraud victims, per findings from Group-IB. The campaign is part of a consumer investment fraud scheme that’s also widely known as pig butchering, in which prospective victims are lured into making…