Cybersecurity

From 500 to 5000 Employees – Securing 3rd Party App-Usage in Mid-Market Companies

Mar 04, 2024The Hacker NewsSaaS Security / Vulnerability Assessment A company’s lifecycle stage, size, and state have a significant impact on its security needs, policies, and priorities. This is particularly true for modern mid-market companies that are either experiencing or have experienced rapid growth. As requirements and tasks continue to accumulate and malicious actors remain […]

Cybersecurity

Multistage RA World Ransomware Uses Anti-AV Tactics, Exploits GPO

Multistage RA World Ransomware Uses Anti-AV Tactics, Exploits GPO Ransomware The Trend Micro threat hunting team came across an RA World attack involving multistage components designed to ensure maximum impact. By: Nathaniel Morales, Katherine Casona, Ieriz Nicolle Gonzalez, Ivan Nicole Chavez, Maristel Policarpio, Jacob Santos March 04, 2024 Read time:  ( words) The RA World […]

Cybersecurity

Cybercriminals harness AI for new era of malware development – Help Net Security

The alliance between ransomware groups and initial access brokers (IABs) is still the powerful engine for cybercriminal industry, as evidenced by the 74% year-on-year increase in the number of companies that had their data uploaded on dedicated leak sites (DLS), according to Group-IB’s Hi-Tech Crime Trends 2023/2024 report. Global threat actors also demonstrated increased interest […]

Cybersecurity

U.S. authorities charged an Iranian national for long-running hacking campaign

U.S. authorities charged an Iranian national for long-running hacking campaign Pierluigi Paganini March 02, 2024 The U.S. DoJ charged Iranian national Alireza Shafie Nasab for his role in attacks targeting U.S. government and defense entities. The U.S. Department of Justice (DoJ) charged Iranian national Alireza Shafie Nasab (39) for multi-year hacking campaign targeting U.S. defense […]

Cybersecurity

Over 100 Malicious AI/ML Models Found on Hugging Face Platform

Mar 04, 2024NewsroomAI Security / Vulnerability As many as 100 malicious artificial intelligence (AI)/machine learning (ML) models have been discovered in the Hugging Face platform. These include instances where loading a pickle file leads to code execution, software supply chain security firm JFrog said. “The model’s payload grants the attacker a shell on the compromised […]

Cybersecurity

Researchers spot new infrastructure likely used for Predator spyware

Cybersecurity researchers have identified new infrastructure likely used by the operators of the commercial spyware known as Predator in at least 11 countries. By analyzing the domains likely used to deliver the spyware, analysts at Recorded Future’s Insikt Group were able to spot potential Predator customers in Angola, Armenia, Botswana, Egypt, Indonesia, Kazakhstan, Mongolia, Oman, […]