Latest Cybersecurity News and Articles


Revival Hijack Attack Puts 22,000 PyPI Packages at Risk of Hijack

05 September 2024
This method could potentially lead to numerous malicious package downloads. The attack involves hijacking popular projects by registering new projects under the names of removed packages on PyPI.

CISA Warns of Three Actively Exploited Vulnerabilities That Demand Immediate Attention

05 September 2024
Two vulnerabilities, CVE-2021-20123 and CVE-2021-20124, pose serious risks for Draytek VigorConnect routers, potentially leading to unauthorized access to sensitive files. Another vulnerability, CVE-2024-7262, affects Kingsoft WPS Office.

RomCom Group’s Underground Ransomware Exploits Microsoft Zero-Day Flaw

05 September 2024
A new ransomware variant named Underground, linked to the Russia-based RomCom group, encrypts files on victims’ Windows machines and demands a ransom for decryption. It has been active since July 2023.

U.S. Seizes 32 Pro-Russian Propaganda Domains in Major Disinformation Crackdown

05 September 2024
The U.S. Department of Justice (DoJ) on Wednesday announced the seizure of 32 internet domains used by a pro-Russian propaganda operation called Doppelganger as part of a sweeping set of actions. Accusing the Russian government-directed foreign malign influence campaign of violating U.S. money laundering and criminal trademark laws, the agency called out companies Social Design Agency (SDA),

FTC cites Verkada for alleged CAN-SPAM violations

05 September 2024
The FTC will require security camera firm Verkada to develop and implement a comprehensive information security program.

NIST Cybersecurity Framework (CSF) and CTEM – Better Together

05 September 2024
It’s been a decade since the National Institute of Standards and Technology (NIST) introduced its Cybersecurity Framework (CSF) 1.0. Created following a 2013 Executive Order, NIST was tasked with designing a voluntary cybersecurity framework that would help organizations manage cyber risk, providing guidance based on established standards and best practices. While this version was originally

FBI Warns Crypto Firms of Aggressive Social Engineering Attacks

05 September 2024
The FBI issued a warning about aggressive social engineering attacks by North Korean hacking groups targeting cryptocurrency firms. The attacks involve deploying malware to steal crypto assets through highly targeted tactics that are hard to detect.

Threat Actors Using MacroPack to Deploy Brute Ratel, Havoc, and PhantomCore Payloads

05 September 2024
Malicious actors potentially utilized the MacroPack red-teaming framework to distribute harmful payloads like Brute Ratel and Havoc tools, as well as a new version of the PhantomCore remote access trojan.

Malware Attackers Using MacroPack to Deliver Havoc, Brute Ratel, and PhantomCore

05 September 2024
Threat actors are likely employing a tool designated for red teaming exercises to serve malware, according to new findings from Cisco Talos. The program in question is a payload generation framework called MacroPack, which is used to generate Office documents, Visual Basic scripts, Windows shortcuts, and other formats for penetration testing and social engineering assessments. It was developed

New Cross-Platform Malware KTLVdoor Discovered in Attack on Chinese Trading Firm

05 September 2024
The Chinese-speaking threat actor known as Earth Lusca has been observed using a new backdoor dubbed KTLVdoor as part of a cyber attack targeting an unnamed trading company based in China. The previously unreported malware is written in Golang, and thus is a cross-platform weapon capable of targeting both Microsoft Windows and Linux systems. "KTLVdoor is a highly obfuscated malware that

Cisco Fixes Two Critical Flaws in Smart Licensing Utility to Prevent Remote Attacks

05 September 2024
Cisco has released security updates for two critical security flaws impacting its Smart Licensing Utility that could allow unauthenticated, remote attackers to elevate their privileges or access sensitive information. A brief description of the two vulnerabilities is below - CVE-2024-20439 (CVSS score: 9.8) - The presence of an undocumented static user credential for an administrative account

US Government Isn’t Ready for Cyber Chaos in the Food and Agriculture Sector

04 September 2024
The industry remains largely unscathed by cyber threats, but recent events like the JBS ransomware attack highlight vulnerabilities. The sector's increased automation makes it a target for hackers, posing risks to the US food supply.

Initial Access Brokers Target $2bn Revenue Companies

04 September 2024
Initial Access Brokers (IABs) are now targeting companies with revenues reaching $2 billion, particularly in the US and business services sector, according to new research from Cyberint.

Ransomware Crisis Deepens as Attacks and Payouts Rise

04 September 2024
The ransomware crisis is escalating, with a surge in attacks and payouts. New ransomware groups like PLAY and Medusa have led a wave of attacks in the second quarter, following the takedown of LockBit and BlackCat.

Travelers Targeted in New Booking.com Phishing Scam

04 September 2024
The attack involves compromising hotel managers' accounts to access customer reservation systems, ultimately tricking hotel guests via the Booking.com app. The scheme utilizes a fake domain to deceive users and harvest sensitive data.

Earth Lusca Uses KTLVdoor Backdoor for Multiplatform Intrusion

04 September 2024
The highly obfuscated KTLVdoor malware has versions for both Microsoft Windows and Linux, allowing attackers to perform tasks like file manipulation, command execution, and remote port scanning.

Dutch Privacy Watchdog Fines Clearview AI $34 Million for ‘Illegal’ Database of Faces

04 September 2024
The Dutch Data Protection Authority (Dutch DPA) fined Clearview AI $34 million for the illegal creation of a facial image database. If Clearview AI does not comply, an additional fine of up to $5.5 million will be imposed.

Emansrepo Stealer: Multi-Vector Attack Chains

04 September 2024
The Python-based infostealer collects user information, text files, PDF files, browser data, crypto wallets, game platforms, browser extensions, and cookies. The stolen data is sent via email to the attacker.

Only 25% of organizations are prepared to manage a DDoS attack

04 September 2024
A survey reveals IT and corporate leadership attitudes toward organizational security preparedness. 

North Korean Hackers Targets Job Seekers with Fake FreeConference App

04 September 2024
North Korean threat actors have leveraged a fake Windows video conferencing application impersonating FreeConference.com to backdoor developer systems as part of an ongoing financially-driven campaign dubbed Contagious Interview. The new attack wave, spotted by Singaporean company Group-IB in mid-August 2024, is yet another indication that the activity is also leveraging native installers for