In a recent report by Trend Micro, it was revealed that the Chinese cyber espionage group Mustang Panda has intensified its operations across Asia, employing a modified variant of the PlugX malware named DOPLUGS....
In response to the escalating threat of cyberattacks on critical infrastructure, the United States agencies CISA, the FBI, and the Environmental Protection Agency (EPA) have issued guidelines to enhance the cybersecurity of Water and...
Analysts warn that hackers have increasingly exploited the Google Cloud Run service for the widespread distribution of banking trojans such as Astaroth, Mekotio, and Ousaban. Google Cloud Run enables users to deploy front-end and...
Cybersecurity specialists at Sysdig have unveiled a new malicious entity dubbed SSH-Snake, designed to stealthily search for private keys and navigate through a victim’s infrastructure, rendering it significantly more perilous than conventional viruses that...
Experts from Cado Security have uncovered a new malicious campaign targeting Redis servers. Once initial access to the systems is secured, the attackers mine cryptocurrency on the compromised Linux-operated hosts. According to Matt Muir,...
In a recent investigation conducted by security specialists from ReversingLabs, two malicious packages were identified within the Python Package Index (PyPI) repository, utilizing the DLL Sideloading technique to circumvent antivirus detection and execute malicious...
PSI Software SE, a German developer of software for intricate manufacturing and logistics processes, confirmed it fell victim to a cyberattack involving ransomware, which compromised its internal infrastructure. Operating globally with a workforce exceeding...
In October of the previous year, Microsoft released a significant update for Windows 11, version 23H2, which introduced the artificial intelligence assistant, Copilot, making Windows 11 the first PC platform to offer centralized AI...
In November of last year, researchers discovered the expansion of malicious activity by an Android trojan named Anatsa into Slovakia, Slovenia, and the Czech Republic. This expansion is part of a new campaign which,...
Analysts have identified a worrying trend in the increase of cryptocurrency fraud, particularly among Fortune 100 companies. According to a report released today by researchers at Resecurity, fraudsters are creating counterfeit tokens in the...
The Cactus Ransomware group has announced the theft of 1.5 terabytes of data from the renowned energy management and automation giant, Schneider Electric. The criminals have posted 25 megabytes of the stolen information on...
On February 15, it was disclosed that Mark Sokolovsky, a 28-year-old Ukrainian and operator of the malicious software “Raccoon Stealer,” was extradited to the United States from the Netherlands to face upcoming legal proceedings....
The Middle East has recently been engulfed by a new wave of cyberattacks orchestrated by the Iranian hacker collective known as Charming Kitten, also referred to as APT35 CharmingCypress and Mint Sandstorm. The hackers...
In recent years, NVIDIA has made significant inroads into the server market, especially with the augmentation of Artificial Intelligence (AI), achieving commendable success. Beyond its core products of CPUs and GPUs, NVIDIA’s acquisition of...
At last year’s “Advancing AI” event, AMD unveiled the Ryzen 8040 series of mobile processors, codenamed “Hawk Point,” employing TSMC’s 4nm process technology. The CPU and GPU architectures remain unchanged, continuing with the original...
Up to 97,000 Exchange servers may be susceptible to a critical vulnerability designated as CVE-2024-21410, a subject we broached several days ago. This flaw permits unauthenticated remote attackers to execute NTLM Relay attacks on...