Pakistani Hackers Use Linux Malware Poseidon to Target Indian Government Agencies
By:
Apr 19, 2023Ravie LakshmananLinux / Malware
The Pakistan-based advanced persistent threat (APT) actor known as Transparent Tribe used a two-factor authentication (2FA) tool used by Indian government agencies as...
Google Uncovers APT41’s Use of Open Source GC2 Tool to Target Media and Job...
By:
Apr 17, 2023Ravie LakshmananCyber Threat / Cloud Security
A Chinese nation-state group targeted an unnamed Taiwanese media organization to deliver an open source red teaming tool known as Google...
New QBot Banking Trojan Campaign Hijacks Business Emails to Spread Malware
By:
Apr 17, 2023Ravie LakshmananFinancial Security / Malware
A new QBot malware campaign is leveraging hijacked business correspondence to trick unsuspecting victims into installing the malware, new findings from Kaspersky...
Severe Android and Novi Survey Vulnerabilities Under Active Exploitation
By:
Apr 14, 2023Ravie LakshmananMobile Security / Cyber Threat
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added two vulnerabilities to its Known Exploited Vulnerabilities (KEV) catalog, based on...
Lazarus Hacker Group Evolves Tactics, Tools, and Targets in DeathNote Campaign
By:
Apr 13, 2023Ravie LakshmananCyber Attack / Cyber Threat
The North Korean threat actor known as the Lazarus Group has been observed shifting its focus and rapidly evolving its tools...
RTM Locker: Emerging Cybercrime Group Targeting Businesses with Ransomware
By:
Apr 13, 2023Ravie LakshmananRansomware / Cyber Attack
Cybersecurity researchers have detailed the tactics of a "rising" cybercriminal gang called "Read The Manual" (RTM) Locker that functions as a private...
Urgent: Microsoft Issues Patches for 97 Flaws, Including Active Ransomware Exploit
By:
Apr 12, 2023Ravie LakshmananPatch Tuesday / Software Updates
It's the second Tuesday of the month, and Microsoft has released another set of security updates to fix a total of...
CISA Warns of 5 Actively Exploited Security Flaws: Urgent Action Required
By:
Apr 10, 2023Ravie LakshmananSoftware Security / Cyber Threat
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Friday added five security flaws to its Known Exploited Vulnerabilities (KEV) catalog,...
Iran-Based Hackers Caught Carrying Out Destructive Attacks Under Ransomware Guise
By:
The Iranian nation-state group known as MuddyWater has been observed carrying out destructive attacks on hybrid environments under the guise of a ransomware operation.
That's according to new findings...
Taiwanese PC Company MSI Falls Victim to Ransomware Attack
By:
Apr 08, 2023Ravie LakshmananMalware / Cyber Attack
Taiwanese PC company MSI (short for Micro-Star International) officially confirmed it was the victim of a cyber attack on its systems.
The company...