Name That Toon: Kiss and Tell
What secrets might be released with a quick peck under the combination lock? For that we need a cybersecurity-related caption. Here are four convenient ways to submit your ideas before the Jan....
NATO-Member Oil Refinery Targeted in Russian APT Blitz Against Ukraine
Physical threats against a Ukrainian cybersecurity researcher and a failed attempt to breach a petroleum refinery inside a NATO-member nation are just the latest notable salvos in Russian state-backed APT...
Raspberry Robin Worm Targets Telcos & Governments
It's likely the group behind the worm called Raspberry Robin is just testing the waters — launching attacks against telecommunications companies and governments across Australia, Europe, and Latin America...
Microsoft Warns on ‘Achilles’ macOS Gatekeeper Bypass
A bypass vulnerability in macOS for Apple's Gatekeeper mechanism could allow cyberattackers to execute malicious applications on target Macs — regardless of whether Lockdown mode is enabled.Among the details...
AWS Elastic IP Transfer Feature Gives Cyberattackers Free Range
Attackers can compromise a new feature in Amazon Web Services (AWS) to hijack cloud accounts' static public IP addresses and abuse them for various malicious purposes, researchers have found.Threat actors...
‘Blindside’ Attack Subverts EDR Platforms From Windows Kernel
A newly pioneered technique could render endpoint detection and response (EDR) platforms "blind" by unhooking the user-facing mode of the Windows kernel (NTDLL) from hardware breakpoints. This potentially gives...
Searchlight Security Changes Name to Searchlight Cyber and Launches New Brand
Portsmouth, UK & Washington DC, US – December 20 2022 -- Searchlight Cyber, the dark web intelligence company, has announced its rebrand from Searchlight Security, aligning its legal entity in both...
Sophisticated DarkTortilla Malware Serves Imposter Cisco, Grammarly Pages
Researchers have spotted two phishing sites — one spoofing a Cisco webpage and the other masquerading as a Grammarly site — that threat actors are using to distribute a...
Malicious Python Trojan Impersonates SentinelOne Security Client
In the latest supply chain attack, an unknown threat actor has created a malicious Python package that appears to be a software development kit (SDK) for a well-known security...
FBI: Criminals Using BEC Attacks to Scavenge Food Shipments
Threat actors have typically used business email compromise (BEC) attacks to steal money from unwary organizations in recent years. But in a new twist, cybercriminals are using them to...