“Cyber warfare is as much about psychological strategy as technical prowess.”
― James Scott
-
The Mask APT Resurfaces with Sophisticated Multi-Platform Malware Arsenal [email protected] (The Hacker News)
A little-known cyber espionage actor known as The Mask has been linked to a new set of attacks targeting an unnamed organization in Latin America twice in 2019 and 2022. “The Mask APT is a legendary threat actor that has been performing highly sophisticated attacks since at least 2007,” Kaspersky researchers Georgy Kucherin and Marc…
-
CISA and FBI Raise Alerts on Exploited Flaws and Expanding HiatusRAT Campaign [email protected] (The Hacker News)
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added two security flaws to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation in the wild. The list of flaws is below – CVE-2024-20767 (CVSS score: 7.4) – Adobe ColdFusion contains an improper access control vulnerability that could allow an attacker to…
-
Cleo Multiple Products Unrestricted File Upload Vulnerability (CVE-2024-50623)
What is the Vulnerability?An unrestricted file upload and download vulnerability (CVE-2024-50623) that could lead to remote code execution, affecting multiple Cleo products is being actively exploited in the wild. The vulnerability affects the following Cleo products (versions before and including 5.8.0.21)-Cleo Harmony -Cleo VLTrader -Cleo LexiCom Cleo is a software company focused on Managed File…
-
The 10 best cloud security certifications for IT pros in 2025
Post ContentRead More
-
5 UC and collaboration trends reshaping the market in 2025
Post ContentRead More
-
7 DevSecOps tools to secure each step of the SDLC
Post ContentRead More
-
DeceptionAds Delivers 1M+ Daily Impressions via 3,000 Sites, Fake CAPTCHA Pages [email protected] (The Hacker News)
Cybersecurity researchers have shed light on a previously undocumented aspect associated with ClickFix-style attacks that hinge on taking advantage of a single ad network service as part of a malvertising-driven information stealer campaign dubbed DeceptionAds. “Entirely reliant on a single ad network for propagation, this campaign showcases the core mechanisms of malvertising — delivering overRead…
-
How to mitigate wiper malware
Post ContentRead More
-
NoviSpy Spyware Installed on Journalist’s Phone After Unlocking It With Cellebrite Tool [email protected] (The Hacker News)
A Serbian journalist had his phone first unlocked by a Cellebrite tool and subsequently compromised by a previously undocumented spyware codenamed NoviSpy, according to a new report published by Amnesty International. “NoviSpy allows for capturing sensitive personal data from a target’s phone after infection and provides the ability to turn on the phone’s microphone or…
-
⚡ THN Weekly Recap: Top Cybersecurity Threats, Tools and Tips [email protected] (The Hacker News)
This past week has been packed with unsettling developments in the world of cybersecurity. From silent but serious attacks on popular business tools to unexpected flaws lurking in everyday devices, there’s a lot that might have flown under your radar. Attackers are adapting old tricks, uncovering new ones, and targeting systems both large and small.…
“Security used to be an inconvenience sometimes, but now it’s a necessity all the time.”
― Martina Navratilova