“Cyber warfare is as much about psychological strategy as technical prowess.”
― James Scott
-
Cybercriminals Target AI Users with Malware-Loaded Installers Posing as Popular Tools [email protected] (The Hacker News)
Fake installers for popular artificial intelligence (AI) tools like OpenAI ChatGPT and InVideo AI are being used as lures to propagate various threats, such as the CyberLock and Lucky_Gh0$t ransomware families, and a new malware dubbed Numero. “CyberLock ransomware, developed using PowerShell, primarily focuses on encrypting specific files on the victim’s system,” Cisco Talos researcher…
-
How to choose and set up a mobile VPN for an iPhone
Many users perform work tasks on their iPhones, relying on mobile VPNs to securely access corporate resources. Learn about VPN options for iPhones and how to set up these systems.Read More
-
New Windows RAT Evades Detection for Weeks Using Corrupted DOS and PE Headers [email protected] (The Hacker News)
Cybersecurity researchers have taken the wraps off an unusual cyber attack that leveraged malware with corrupted DOS and PE headers, according to new findings from Fortinet. The DOS (Disk Operating System) and PE (Portable Executable) headers are essential parts of a Windows PE file, providing information about the executable. While the DOS header makes the…
-
Security risks of AI-generated code and how to manage them
Application security teams are understandably worried about how developers use GenAI and LLMs to create code. But it’s not all doom and gloom; GenAI can help secure code, too.Read More
-
DragonForce Exploits SimpleHelp Flaws to Deploy Ransomware Across Customer Endpoints [email protected] (The Hacker News)
The threat actors behind the DragonForce ransomware gained access to an unnamed Managed Service Provider’s (MSP) SimpleHelp remote monitoring and management (RMM) tool, and then leveraged it to exfiltrate data and drop the locker on multiple endpoints. It’s believed that the attackers exploited a trio of security flaws in SimpleHelp (CVE-2024-57727, CVE-2024-57728, and CVE-2024-57726) that…
-
Chinese APT41 Exploits Google Calendar for Malware Command-and-Control Operations [email protected] (The Hacker News)
Google on Wednesday disclosed that the Chinese state-sponsored threat actor known as APT41 leveraged a malware called TOUGHPROGRESS that uses Google Calendar for command-and-control (C2). The tech giant, which discovered the activity in late October 2024, said the malware was hosted on a compromised government website and was used to target multiple other government entities.…
-
Over 100,000 WordPress Sites at Risk from Critical CVSS 10.0 Vulnerability in Wishlist Plugin [email protected] (The Hacker News)
Cybersecurity researchers have disclosed a critical unpatched security flaw impacting TI WooCommerce Wishlist plugin for WordPress that could be exploited by unauthenticated attackers to upload arbitrary files. TI WooCommerce Wishlist, which has over 100,000 active installations, is a tool to allow e-commerce site customers to save their favorite products for later and share the lists…
-
Iranian Hacker Pleads Guilty in $19 Million Robbinhood Ransomware Attack on Baltimore [email protected] (The Hacker News)
An Iranian national has pleaded guilty in the U.S. over his involvement in an international ransomware and extortion scheme involving the Robbinhood ransomware. Sina Gholinejad (aka Sina Ghaaf), 37, and his co-conspirators are said to have breached the computer networks of various organizations in the United States and encrypted files with Robbinhood ransomware to demand…
-
Czech Republic Blames China-Linked APT31 Hackers for 2022 Cyberattack [email protected] (The Hacker News)
The Czech Republic on Wednesday formally accused a threat actor associated with the People’s Republic of China (PRC) of targeting its Ministry of Foreign Affairs. In a public statement, the government said it identified China as the culprit behind a malicious campaign targeting one of the unclassified networks of the Czech Ministry of Foreign Affairs.…
-
Microsoft OneDrive File Picker Flaw Grants Apps Full Cloud Access — Even When Uploading Just One File [email protected] (The Hacker News)
Cybersecurity researchers have discovered a security flaw in Microsoft’s OneDrive File Picker that, if successfully exploited, could allow websites to access a user’s entire cloud storage content, as opposed to just the files selected for upload via the tool. “This stems from overly broad OAuth scopes and misleading consent screens that fail to clearly explain…
“Security used to be an inconvenience sometimes, but now it’s a necessity all the time.”
― Martina Navratilova