The United States Treasury Department has announced the imposition of sanctions against four Iranian citizens and two corporations for their involvement in cyberattacks targeting U.S. government agencies, defense contractors, and private companies. The sanctions...
According to a recent report by Cisco Talos, the CoralRaider group is utilizing CDN platforms to disseminate malware in the United States, the United Kingdom, Germany, and Japan. The campaign aims to pilfer credentials,...
On April 17, researchers at Zscaler exposed a malicious software distribution campaign targeting IT professionals. This operation employs deceptive advertising of popular network utilities to implant a new backdoor named MadMxShell. The campaign was...
Cybersecurity experts from Fortinet have identified a new malicious package in the PyPI registry for developers, aimed at stealing user data from Discord. The package, named “discordpy_bypass-1.7,” was published on March 10, 2024, and...
As a result of an alleged cyberattack by a hacking group associated with the Anonymous collective, the Israeli Defense Forces (IDF) faced claims of compromising confidential data. According to the hackers, they accessed 20...
Over the past few years, security experts have observed an intensification of cyberattacks on organizations in Eastern and Western Europe, as well as North America. The perpetrators are hackers from the group known as...
Shmuel Cohen, a specialist at SafeBreach, demonstrated that EDR (Endpoint Detection and Response) solutions can be utilized as tools for conducting attacks. In his research, Cohen analyzed an EDR system, identifying vulnerabilities that could...
Specialists from Kaspersky Lab have discovered that the hacking group ToddyCat employs a diverse array of tools to maintain access to compromised systems and steal valuable data. Active since December 2020, the group primarily...
JPCERT specialists are raising alarms about a series of critical vulnerabilities in the Forminator plugin for WordPress, developed by WPMU DEV. This plugin, utilized by over 500,000 websites, enables the creation of various forms...
In the first quarter of 2024, the percentage of companies that agreed to pay ransoms to cybercriminals reached a record low of 28%. This statistic was provided by Coveware, a firm specializing in cybersecurity....
A recent study has unveiled vulnerabilities in the Windows operating system’s process of converting DOS to NT paths, potentially allowing malicious actors to conceal files, mimic directories and processes, and gain capabilities akin to...
Octapharma Plasma recently encountered a significant disruption within its IT infrastructure, resulting in the closure of over 150 blood plasma collection centers across the USA. The company’s website displayed a banner informing visitors that...
The operator of the HelloKitty ransomware program has announced a rebranding to HelloGookie and has released passwords for previously leaked source codes of CD Projekt RED, information about Cisco networks, as well as decryption...
Users of the CrushFTP file transfer software are strongly advised to upgrade to the latest version following the discovery of a vulnerability that has been subject to targeted exploitation. CrushFTP has issued a warning...
Palo Alto Networks has disclosed details of a critical vulnerability in the PAN-OS that has been actively exploited. The vulnerability designated CVE-2024-3400 with a CVSS score of 10.0, arises from a combination of two...
A recently uncovered cyberattack has impacted the technological, scientific, and governmental sectors across the Asia-Pacific region. The attack has been attributed to the hacker group BlackTech, known for its sophisticated methods of obfuscating its...