Category: Uncategorized
-
How to mitigate wiper malware
Post ContentRead More
-
NoviSpy Spyware Installed on Journalist’s Phone After Unlocking It With Cellebrite Tool [email protected] (The Hacker News)
A Serbian journalist had his phone first unlocked by a Cellebrite tool and subsequently compromised by a previously undocumented spyware codenamed NoviSpy, according to a new report published by Amnesty International. “NoviSpy allows for capturing sensitive personal data from a target’s phone after infection and provides the ability to turn on the phone’s microphone or…
-
⚡ THN Weekly Recap: Top Cybersecurity Threats, Tools and Tips [email protected] (The Hacker News)
This past week has been packed with unsettling developments in the world of cybersecurity. From silent but serious attacks on popular business tools to unexpected flaws lurking in everyday devices, there’s a lot that might have flown under your radar. Attackers are adapting old tricks, uncovering new ones, and targeting systems both large and small.…
-
Data Governance in DevOps: Ensuring Compliance in the AI Era [email protected] (The Hacker News)
With the evolution of modern software development, CI/CD pipeline governance has emerged as a critical factor in maintaining both agility and compliance. As we enter the age of artificial intelligence (AI), the importance of robust pipeline governance has only intensified. With that said, we’ll explore the concept of CI/CD pipeline governance and why it’s vital,…
-
New Investment Scam Leverages AI, Social Media Ads to Target Victims Worldwide [email protected] (The Hacker News)
Cybersecurity researchers are calling attention to a new kind of investment scam that leverages a combination of social media malvertising, company-branded posts, and artificial intelligence (AI) powered video testimonials featuring famous personalities, ultimately leading to financial and data loss. “The main goal of the fraudsters is to lead victims to phishing websites and forms that…
-
New Glutton Malware Exploits Popular PHP Frameworks Like Laravel and ThinkPHP [email protected] (The Hacker News)
Cybersecurity researchers have discovered a new PHP-based backdoor called Glutton that has been put to use in cyber attacks targeting China, the United States, Cambodia, Pakistan, and South Africa. QiAnXin XLab, which discovered the malicious activity in late April 2024, attributed the previously unknown malware with moderate confidence to the prolific Chinese nation-state group tracked…
-
Ukrainian Minors Recruited for Cyber Ops and Reconnaissance in Russian Airstrikes [email protected] (The Hacker News)
The Security Service of Ukraine (SBU or SSU) has exposed a novel espionage campaign suspected to be orchestrated by Russia’s Federal Security Service (FSB) that involves recruiting Ukrainian minors for criminal activities under the guise of “quest games.” Law enforcement officials said that it detained two FSB agent groups following a special operation in Kharkiv.…
-
ESET: RansomHub most active ransomware group in H2 2024
Post ContentRead More
-
Germany Disrupts BADBOX Malware on 30,000 Devices Using Sinkhole Action [email protected] (The Hacker News)
Germany’s Federal Office of Information Security (BSI) has announced that it has disrupted a malware operation called BADBOX that came preloaded on at least 30,000 internet-connected devices sold across the country. In a statement published earlier this week, authorities said they severed the communications between the devices and their command-and-control (C2) servers by sinkholing the…
-
Thai Officials Targeted in Yokai Backdoor Campaign Using DLL Side-Loading Techniques [email protected] (The Hacker News)
Thai government officials have emerged as the target of a new campaign that leverages a technique called DLL side-loading to deliver a previously undocumented backdoor dubbed Yokai. “The target of the threat actors were Thailand officials based on the nature of the lures,” Nikhil Hegde, senior engineer for Netskope’s Security Efficacy team, told The Hacker…