Latest Cybersecurity News and Articles


North Korean ScarCruft Exploits Windows Zero-Day to Spread RokRAT Malware

16 October 2024
The North Korean threat actor known as ScarCruft has been linked to the zero-day exploitation of a now-patched security flaw in Windows to infect devices with malware known as RokRAT. The vulnerability in question is CVE-2024-38178 (CVSS score: 7.5), a memory corruption bug in the Scripting Engine that could result in remote code execution when using the Edge browser in Internet Explorer Mode.

5 Techniques for Collecting Cyber Threat Intelligence

16 October 2024
To defend your organization against cyber threats, you need a clear picture of the current threat landscape. This means constantly expanding your knowledge about new and ongoing threats. There are many techniques analysts can use to collect crucial cyber threat intelligence. Let’s consider five that can greatly improve your threat investigations. Pivoting on С2 IP addresses to pinpoint malware

Astaroth Banking Malware Resurfaces in Brazil via Spear-Phishing Attack

16 October 2024
A new spear-phishing campaign targeting Brazil has been found delivering a banking malware called Astaroth (aka Guildma) by making use of obfuscated JavaScript to slip past security guardrails. "The spear-phishing campaign's impact has targeted various industries, with manufacturing companies, retail firms, and government agencies being the most affected," Trend Micro said in a new analysis. "

GitHub Patches Critical Flaw in Enterprise Server Allowing Unauthorized Instance Access

16 October 2024
GitHub has released security updates for Enterprise Server (GHES) to address multiple issues, including a critical bug that could allow unauthorized access to an instance. The vulnerability, tracked as CVE-2024-9487, carries a CVS score of 9.5 out of a maximum of 10.0 "An attacker could bypass SAML single sign-on (SSO) authentication with the optional encrypted assertions feature, allowing

CISA Warns of Active Exploitation in SolarWinds Help Desk Software Vulnerability

16 October 2024
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday added a critical security flaw impacting SolarWinds Web Help Desk (WHD) software to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation. Tracked as CVE-2024-28987 (CVSS score: 9.1), the vulnerability relates to a case of hard-coded credentials that could be abused to gain

TrickMo Banking Trojan Can Now Capture Android PINs and Unlock Patterns

15 October 2024
New variants of an Android banking trojan called TrickMo have been found to harbor previously undocumented features to steal a device's unlock pattern or PIN. "This new addition enables the threat actor to operate on the device even while it is locked," Zimperium security researcher Aazim Yaswant said in an analysis published last week. First spotted in the wild in 2019, TrickMo is so named for

New Malware Campaign Uses PureCrypter Loader to Deliver DarkVision RAT

15 October 2024
Cybersecurity researchers have disclosed a new malware campaign that leverages a malware loader named PureCrypter to deliver a commodity remote access trojan (RAT) called DarkVision RAT. The activity, observed by Zscaler ThreatLabz in July 2024, involves a multi-stage process to deliver the RAT payload. "DarkVision RAT communicates with its command-and-control (C2) server using a custom network

New Linux Variant of FASTCash Malware Targets Payment Switches in ATM Heists

15 October 2024
North Korean threat actors have been observed using a Linux variant of a known malware family called FASTCash to steal funds as part of a financially-motivated campaign. The malware is "installed on payment switches within compromised networks that handle card transactions for the means of facilitating the unauthorized withdrawal of cash from ATMs," a security researcher who goes by HaxRob said.

53% of survey respondents admit to paying over $500,000 ransom

15 October 2024
A report found that 53% of organizations met ransom demands of more than $500,000 USD to recover access to encrypted systems and files.

38% of organizations are at risk of critical exposures

15 October 2024
38% of organizations are at risk of critical exposures due to a combination of security shortfalls.

The Rise of Zero-Day Vulnerabilities: Why Traditional Security Solutions Fall Short

15 October 2024
In recent years, the number and sophistication of zero-day vulnerabilities have surged, posing a critical threat to organizations of all sizes. A zero-day vulnerability is a security flaw in software that is unknown to the vendor and remains unpatched at the time of discovery. Attackers exploit these flaws before any defensive measures can be implemented, making zero-days a potent weapon for

All UK schools offered free cyber service to protect against online threats

15 October 2024
Following the successful initial roll out of PDNS for Schools last year, all schools in the UK can now benefit from the enhanced cyber resilience service.

China Accuses U.S. of Fabricating Volt Typhoon to Hide Its Own Hacking Campaigns

15 October 2024
China's National Computer Virus Emergency Response Center (CVERC) has doubled down on claims that the threat actor known as the Volt Typhoon is a fabrication of the U.S. and its allies. The agency, in collaboration with the National Engineering Laboratory for Computer Virus Prevention Technology, went on to accuse the U.S. federal government, intelligence agencies, and Five Eyes countries of

Researchers Uncover Hijack Loader Malware Using Stolen Code-Signing Certificates

15 October 2024
Cybersecurity researchers have disclosed a new malware campaign that delivers Hijack Loader artifacts that are signed with legitimate code-signing certificates. French cybersecurity company HarfangLab, which detected the activity at the start of the month, said the attack chains aim to deploy an information stealer known as Lumma. Hijack Loader, also known as DOILoader, IDAT Loader, and

WordPress Plugin Jetpack Patches Major Vulnerability Affecting 27 Million Sites

15 October 2024
The maintainers of the Jetpack WordPress plugin have released a security update to remediate a critical vulnerability that could allow logged-in users to access forms submitted by others on a site. Jetpack, owned by WordPress maker Automattic, is an all-in-one plugin that offers a comprehensive suite of tools to improve site safety, performance, and traffic growth. It's used on 27 million

39% of consumers admit to using generative AI on a weekly basis

14 October 2024
Twenty-seven percent of employed survey respondents use privacy tools and settings to protect workplace information when using generative AI.

Fidelity Investments data breach impacts more than 77,000 customers

14 October 2024
Fidelity Investments announced it experienced a data breach.

Nation-State Attackers Exploiting Ivanti CSA Flaws for Network Infiltration

14 October 2024
A suspected nation-state adversary has been observed weaponizing three security flaws in Ivanti Cloud Service Appliance (CSA) a zero-day to perform a series of malicious actions. That's according to findings from Fortinet FortiGuard Labs, which said the vulnerabilities were abused to gain unauthenticated access to the CSA, enumerate users configured in the appliance, and attempt to access the

5 Steps to Boost Detection and Response in a Multi-Layered Cloud

14 October 2024
The link between detection and response (DR) practices and cloud security has historically been weak. As global organizations increasingly adopt cloud environments, security strategies have largely focused on "shift-left" practices—securing code, ensuring proper cloud posture, and fixing misconfigurations. However, this approach has led to an over-reliance on a multitude of DR tools spanning

Supply Chain Attacks Exploit Entry Points in Python, npm, and Open-Source Ecosystems

14 October 2024
Cybersecurity researchers have found that entry points could be abused across multiple programming ecosystems like PyPI, npm, Ruby Gems, NuGet, Dart Pub, and Rust Crates to stage software supply chain attacks. "Attackers can leverage these entry points to execute malicious code when specific commands are run, posing a widespread risk in the open-source landscape," Checkmarx researchers Yehuda