Category: Information Security

EDR attack

EDR Exposed: Security Tools Turned into Weapons

Shmuel Cohen, a specialist at SafeBreach, demonstrated that EDR (Endpoint Detection and Response) solutions can be utilized as tools for conducting attacks. In his research, Cohen analyzed an EDR system, identifying vulnerabilities that could...

ToddyCat

ToddyCat APT: A Cyber Threat to Asia-Pacific

Specialists from Kaspersky Lab have discovered that the hacking group ToddyCat employs a diverse array of tools to maintain access to compromised systems and steal valuable data. Active since December 2020, the group primarily...

WordPress 5.0

Critical Flaws Found in Popular WordPress Plugin

JPCERT specialists are raising alarms about a series of critical vulnerabilities in the Forminator plugin for WordPress, developed by WPMU DEV. This plugin, utilized by over 500,000 websites, enables the creation of various forms...

Akira Ransomware

Cybercrime Trend: Fewer Firms Pay Ransoms

In the first quarter of 2024, the percentage of companies that agreed to pay ransoms to cybercriminals reached a record low of 28%. This statistic was provided by Coveware, a firm specializing in cybersecurity....

Moobot botnet

Octapharma Plasma Hit by Ransomware: Centers Shut Down

Octapharma Plasma recently encountered a significant disruption within its IT infrastructure, resulting in the closure of over 150 blood plasma collection centers across the USA. The company’s website displayed a banner informing visitors that...

CrushFTP zero-day vulnerability

CrushFTP Zero-Day Patched: Update Now (v11.1.0)

Users of the CrushFTP file transfer software are strongly advised to upgrade to the latest version following the discovery of a vulnerability that has been subject to targeted exploitation. CrushFTP has issued a warning...

Earth Hundun

Earth Hundun’s Waterbear Rampage Targets Asia-Pacific

A recently uncovered cyberattack has impacted the technological, scientific, and governmental sectors across the Asia-Pacific region. The attack has been attributed to the hacker group BlackTech, known for its sophisticated methods of obfuscating its...

MITRE hacked

MITRE Hacked: State-Sponsored Breach Exploits Zero-Days

The MITRE Corporation, a non-profit organization, has disclosed that in January 2024, a sophisticated, state-sponsored hacker group infiltrated its systems by chaining together two zero-day exploits in the Ivanti VPN. The incident was initially...

Junk gun ransomware

Ransomware for Sale: Your Data Held Hostage

From June 2023 to February 2024, specialists from Sophos‘s cyber intelligence division identified 19 different types of ransomware being offered for sale on four dark web forums for relatively modest sums, ranging from $20...

New York Times Sues OpenAI

GPT-4: AI Model Turned Exploit Expert

Researchers from the University of Illinois at Urbana-Champaign recently published a study demonstrating that OpenAI’s artificial intelligence model, GPT-4, is capable of independently exploiting vulnerabilities in real systems once it receives detailed descriptions of...