Short Summary:
The “Vilsa Stealer” is a newly identified malware discovered on GitHub, known for its efficiency in extracting sensitive data from various applications. It targets browser credentials, crypto wallets, …
Short Summary:
The “Vilsa Stealer” is a newly identified malware discovered on GitHub, known for its efficiency in extracting sensitive data from various applications. It targets browser credentials, crypto wallets, …
Meow, a ransomware group that emerged in 2022, has gained attention for its unique operational model and rising victim count. It is often linked to Meow Leaks, which …
Short Summary:
Medusa is a Ransomware-as-a-Service (RaaS) targeting Windows environments, active since June 2021. It gained attention in early 2023 with the launch of its Dedicated Leak Site. Medusa spreads …
The Summer Intelligence Insights report by Securonix Threat Labs highlights significant cyber threats identified over the last three months, including phishing campaigns, cyber-espionage efforts, and ransomware attacks. The …
Threat Actor: Fortibitch | Fortibitch Victim: Fortinet | Fortinet Price: 440GB of data Exfiltrated Data Type: Limited data related to Fortinet customers
Key Points :
A threat actor named Fortibitch…Threat Actor: Unknown | unknown Victim: Fortinet | Fortinet Price: Not disclosed Exfiltrated Data Type: 440 GB of data
Key Points :
Fortinet, a prominent cybersecurity firm, reportedly suffered a…The report by CYFIRMA details the discovery of a sophisticated dropper binary known as BLX Stealer (or XLABB Stealer), designed to steal sensitive information from compromised systems. This …
Short Summary:
Mallox, also known as TargetCompany, FARGO, and Tohnichi, is a ransomware strain active since June 2021, operating under a Ransomware-as-a-Service (RaaS) model. It primarily targets unsecured MS-SQL servers …
Summary: This report analyzes the rising use of data-exfiltration tools, particularly Rclone, by threat actors in cyber incidents, highlighting their capabilities and the implications for organizations. It also provides recommendations …
Threat Actor: NVIDIA | NVIDIA Victim: Google, Netflix | Google, Netflix Price: Legal and ethical repercussions Exfiltrated Data Type: Videos from various sources
Key Points :
NVIDIA has reportedly used…Summary: Security researchers have identified the largest publicly known ransomware payment of $75 million made to the Dark Angels group, highlighting a significant increase in ransomware attacks and the potential …
Summary: Healthcare organizations are increasingly at risk of exposing sensitive data, with a significant percentage of both publicly and privately shared files containing Personally Identifiable Information (PII). The rise in …
Summary: A recent study by Netskope reveals that over a third of sensitive data shared with GenAI applications is regulated, posing significant risks to businesses, including costly data breaches. Despite …
Cactus is a ransomware strain discovered in March 2023 known for having compromised more than 140 entities as of July 2024.
Cactus typically obtains access to corporate networks by exploiting …
Nefilim is a Ransomware-as-a-Service (RaaS) operation that emerged in March 2020 and is believed to have evolved from the Nemty ransomware family. This attribution is due to the fact that …
Summary: The content discusses the use of unsanctioned apps, including AI, by cybersecurity professionals and the risks associated with it.
Threat Actor: N/A Victim: N/A
Key Point :
73% of…Summary: This content discusses a data security startup called Odaseva that has raised $54 million to enhance its services.
Threat Actor: N/A Victim: N/A
Key Point :
A data security…Summary: This content discusses the topic of data security and the funding raised by a data security vendor.
Threat Actor: N/A Victim: N/A
Key Point :
A data security vendor,…Summary: Cloudflare acquires a zero trust infrastructure access startup to enhance remote access security for critical infrastructure.
Threat Actor: Cloudflare | Cloudflare Victim: N/A
Key Point :
Cloudflare has purchased…Summary: CISOs are increasingly confident in their ability to defend against cyber threats, despite the growing fear of cyber attacks.
Threat Actor: N/A
Victim: N/A
Key Point :
70% of…In a hacker forum monitored by SOCRadar, a new alleged database leak is detected for Hak Asasi Manusia.
"1****************** PRESIDEN RE******************TENTANG AKSI ******************NULL,NULL,NULL,"1"******************"24","INPRES",NULL,NUL******************",,NULL,"1",,******************","2020-04-07******************"3******************ATAN) MODUL ******************APARAT PENEGA******************KSAAN",NULL,,"-",N******************","1",NULL,"-",NULL,,"******************ULL,"-","-","******************,"1","2019-06******************:36:47"Nature of Dark Web …
Key Points
Escalated tensions between Iran and Israel could give rise to cyber threats. Several advanced persistent threat (APT) groups are involved on both sides: APT34, APT35, and CyberAv3ngers in…Email Security Appliances (ESAs) are hardware or software solutions designed to protect an organization’s email system from a wide range of email-based threats. These appliances play a crucial role in …
OceanLotus, also known as APT32, Ocean Buffalo, and SeaLotus, is a highly sophisticated adversary operating on behalf of the interests of the Vietnamese government that was first identified by the …
GhostSec, a significant member of The Five Families, has garnered substantial attention with the latest research, following their recent twin ransomware attack with Stormous –another Five Families affiliated threat group. Researchers and the …
Being a CISO is a balancing act: ensuring organizations are secure without compromising users’ productivity. This requires taking multiple elements into consideration, like cost, complexity, performance and user experience. CISOs …
Mar 13, 2024The Hacker NewsApp Security / Cyber Security
One of the most common misconceptions in file upload cybersecurity is that certain tools are “enough” on their own—this is simply …
Mar 11, 2024The Hacker NewsCybersecurity / Browser Security
As the shift of IT infrastructure to cloud-based solutions celebrates its 10-year anniversary, it becomes clear that traditional on-premises approaches to data …
As AI continues to capture everyone’s attention, security for AI has become a popular topic in the marketplace of ideas. Security for AI is capturing the media cycle; AI security …
Dtex Systems, a Silicon Valley company working on technology to automate the detection of insider threats, has raised $50 million in late-stage funding led by CapitalG, the investment arm of …
In the realm of cybersecurity, understanding the various data types within an infrastructure is essential for effective defense and management. These data types serve as the foundation for identifying, analyzing, …
Today’s attackers are taking advantage of changing business dynamics to target people everywhere they work. Staying current on the latest cybersecurity attack vectors and threats is an essential part of …
This post is also available in: 日本語 (Japanese)
Executive SummaryInsidious Taurus (aka Volt Typhoon) is identified by U.S. government agencies and international government partners as People’s Republic of China …
If you have anything to do with cyber security, you know it employs its own unique and ever-evolving language. Jargon and acronyms are the enemies of clear writing—and are beloved …
By Trellix · August 17, 2023 This story was also written by Phelix Oluoch
Executive SummaryScattered Spider, also referred to as UNC3944, Scatter Swine, and Muddled Libra, is a …
Microsoft’s Visual Studio is a highly popular Integrated Development Environment (IDE) that empowers developers to create diverse applications. However, the software’s widespread usage …
In the realm of cybersecurity, malicious programs continuously evolve to exploit the vulnerabilities of unsuspecting victims. One particularly notorious threat that …
Threat Actors (TAs) commonly employ fake phishing websites as their preferred method for distributing malware. This is due to the ease of luring …
On May 20th, an incident report was released by PyPI administrators that announced the temporary suspension of new user and project name registrations. The …
SharpPanda, an APT group originating from China, has seen a rise in its cyber-attack operations starting from at least 2018. The APT …
It is apparent from past evidence that threat actors (TAs) utilize social media platforms to demonstrate their technical expertise …
DUCKTAIL, a financially motivated malware variant, specifically aims at individuals and businesses utilizing a Social Media Business/Ads platform. The …
Cyble Research and Intelligence Labs (CRIL) recently uncovered a new strain of malware named “MDBotnet” on a cybercrime forum. Our analysis indicates that …
PyPI (Python Package Index) is a widely used repository for software packages for the Python programming language, utilized by developers worldwide …
Malware loaders are programs or scripts that have been created to install and run different types of malware on a victim’s computer system. …
Threat actors (TAs) employ diverse file formats to disseminate malicious payloads, primarily to enhance the likelihood of a successful infection. …
Cyble Research and Intelligence Labs (CRIL) discovered a new Malware-as-a-Service (MaaS) platform called “Cinoshi”. Cinoshi’s arsenal consists of a stealer, botnet, clipper, …
SideCopy APT is a Threat Actor(TA) from Pakistan that has been active since 2019, focusing on targeting South Asian nations, …