North Korean hacking activity ceases after regulators implement KYC – Report
According to a new press report published by South Korea's National Intelligence Service (NIS), North Korean hackers have stolen more than 800 billion Korean won ($620 million) worth of...
Ransomware Attackers Bypass Microsoft’s ProxyNotShell Mitigations With Fresh Exploit
The operators of a ransomware strain called Play have developed a new exploit chain for a critical remote code execution (RCE) vulnerability in Exchange Server that Microsoft patched in...
Godfather Banking Trojan Masquerades as Legitimate Google Play App
A type of Android malware that's been targeting banking users worldwide since March has resurfaced with advanced obfuscation methods, masquerading as a legitimate application on the Google Play store with...
Name That Toon: Kiss and Tell
What secrets might be released with a quick peck under the combination lock? For that we need a cybersecurity-related caption. Here are four convenient ways to submit your ideas before the Jan....
Crypto on-chain crime drama sees the good guys finally win
The stories about people getting their private keys hacked or stolen are nothing new, with a number losing their life savings because of these thefts. However, in quite an...
NATO-Member Oil Refinery Targeted in Russian APT Blitz Against Ukraine
Physical threats against a Ukrainian cybersecurity researcher and a failed attempt to breach a petroleum refinery inside a NATO-member nation are just the latest notable salvos in Russian state-backed APT...
Raspberry Robin Worm Targets Telcos & Governments
It's likely the group behind the worm called Raspberry Robin is just testing the waters — launching attacks against telecommunications companies and governments across Australia, Europe, and Latin America...
Microsoft Warns on ‘Achilles’ macOS Gatekeeper Bypass
A bypass vulnerability in macOS for Apple's Gatekeeper mechanism could allow cyberattackers to execute malicious applications on target Macs — regardless of whether Lockdown mode is enabled.Among the details...
AWS Elastic IP Transfer Feature Gives Cyberattackers Free Range
Attackers can compromise a new feature in Amazon Web Services (AWS) to hijack cloud accounts' static public IP addresses and abuse them for various malicious purposes, researchers have found.Threat actors...
‘Blindside’ Attack Subverts EDR Platforms From Windows Kernel
A newly pioneered technique could render endpoint detection and response (EDR) platforms "blind" by unhooking the user-facing mode of the Windows kernel (NTDLL) from hardware breakpoints. This potentially gives...