Category: Information Security

GoldPickaxe

GoldFactory Expands GoldPickaxe Malware Operations

Cybercriminals have commenced targeting iPhone owners with malicious software designed to steal 3D facial scans, facilitating unauthorized access to bank accounts. This was disclosed by Group-IB, a cybersecurity firm, which uncovered that a Chinese...

US Government Network Breached

US Government Network Breached: Ex-Employee Account Exploited

The United States Cybersecurity and Infrastructure Security Agency (CISA), in collaboration with the Multi-State Information Sharing and Analysis Center (MS-ISAC), established that unidentified malefactors accessed one of the U.S. government’s internal networks via an...

TinyTurla-NG backdoor

Turla APT Deploys New TinyTurla-NG Backdoor

At the close of 2023, specialists at Cisco Talos identified a campaign orchestrated by the group Turla APT, targeting Polish non-governmental organizations. This assault utilized a novel backdoor, TinyTurla-NG. A distinctive feature of TinyTurla-NG...

Pulse Secure Vulnerabilities

Thousands of Vulnerabilities Found in Pulse Secure

A recent investigation into the firmware of Pulse Secure devices by Ivanti has illuminated profound security vulnerabilities within software supply chains. Specialists at Eclypsium uncovered numerous vulnerabilities, showcasing the complexity of safeguarding such software...

Moobot botnet

Moobot Botnet Takedown: US Disrupts Hacker Operations

In a strikingly orchestrated endeavor during January, the United States authorities successfully dismantled a botnet implicated in conducting espionage and cyberattacks against American and international targets. This operation, spearheaded by law enforcement, entailed purging...

Bumblebee malware

Cybersecurity Alert: Bumblebee Malware Resurfaces

After a four-month hiatus, the Bumblebee malware has reemerged, launching extensive phishing campaigns against thousands of organizations within the United States. Bumblebee, a loader discovered in April 2022, is believed to have been developed by...

Zardoor backdoor

“Zardoor” Backdoor Spied on Non-Profit for Years

The Cisco Talos research team uncovered a vast espionage campaign targeted at a non-profit charitable organization in Saudi Arabia. Commencing in March 2021, the campaign employed a previously unknown custom backdoor named Zardoor, which...

Juniper data leak

Juniper Support Portal Leaks Sensitive Customer Data

A 17-year-old researcher discovered that through the Juniper customer support portal, information about devices and support contracts for numerous clients could be accessed. The data leak has been ongoing since September 2023. Esteemed cybersecurity...