Category: Information Security

pay hackers ransom

Phobos Ransomware Targets US Critical Infrastructure

The Cybersecurity and Infrastructure Security Agency (CISA) in the United States has issued an advisory warning about the known attack methodologies and indicators of compromise utilized by the Phobos ransomware group. This guidance aims...

spyware Predator

Predator Spyware Spreads: 11 Countries Targeted

Insikt Group has identified a new infrastructure purportedly utilized by operators of the commercial spyware Predator in at least 11 countries. Through an examination of domains potentially employed for disseminating the software, experts pinpointed...

video doorbells vulnerabilities

Warning: Eken Doorbells Vulnerable to Hackers

Researchers at Consumer Reports (CR) have uncovered vulnerabilities in video doorbells manufactured by China’s Eken Group Ltd. The company, which produces devices under the EKEN and Tuck brand names, distributes its products through major...

CVE-2021-28550

Fraudsters Target Pepco in Major Phishing Attack

The European retail chain Pepco was deceitfully coerced into transferring a substantial amount of funds to fraudsters through an intricate phishing attack, as disclosed in its official press release. The Hungarian division of Pepco...

malicious AI worm

Warning: AI Now Attacks AI in Self-Spreading Worm

In a groundbreaking study, a team of scientists has unveiled the creation of the first-of-its-kind malicious AI worm capable of autonomously spreading among generative AI agents, paving the way for potential data theft and...

CryptoChameleon phishing toolkit

CryptoChameleon Phishing Kit Targets FCC Staff

Lookout has reported that the new phishing toolkit, CryptoChameleon, has become a tool for attacks against employees of the Federal Communications Commission (FCC), utilizing a counterfeit Okta authentication system. The campaign targets users and...

GTPDOOR backdoor

New Linux Threat: GTPDOOR Backdoor Spies on Networks

Researchers have unveiled a novel menace targeting telecommunications networks: the cunning Linux-based backdoor, GTPDOOR, exploiting GPRS protocol vulnerabilities to clandestinely monitor infected devices. This malevolent software, linked to the notorious hacking collective LightBasin previously...

Silver SAML Attack

Silver SAML: New Attack Bypasses Identity Defenses

Semperis has unveiled a novel attack technique named Silver SAML, capable of circumventing protection in identification systems. Silver SAML enables the utilization of SAML to initiate attacks from the identity provider’s side (such as...

GitHub malicious campaign

GitHub Under Attack: 100,000+ Fake Repositories Spreading Malware

Researchers at Apiiro investigated a widespread campaign of attacks on the GitHub platform using malicious repositories. The experts identified over 100,000 counterfeit repositories, mimicking popular open-source projects to disseminate malware. The number of such...