Cybersecurity
Category Added in a WPeMatico Campaign
Phishing attackers are increasingly using PDF documents to conduct successful campaigns by exploiting the trustworthiness of the file format and leveraging social engineering tactics.
A particularly nefarious Banking Trojan, TrickBot, has reemerged, this time with an Android variant named “TrickMo” – a reference to a similar strain of banking malware earlier observed by IBM researchers called “ZitMo” developed by the Zeus cybercriminal group. Cyble Research and Intelligence Labs conducted a deep dive into the latest variant of TrickMo in […]
ArmorCode, a cybersecurity platform that gathers vulnerability data from connected apps and software infrastructure, consolidating the data into a single location and standardizing it for analysis, has raised $40 million in a Series B round led by HighlandX with participation from NGP Capital, Ballistic Ventures, Sierra Ventures and Cervin. Bringing ArmorCode’s total raised to $65 […]
The OpenZFS development team has released two new versions of the open-source cross-platform filesystem. Version 2.2.2 fixes a bug that caused data corruption in file copies and affected FreeBSD 14 and various Linux distros.
Dec 05, 2023NewsroomCyber Espionage / Threat Analysis A previously undocumented threat actor has been linked to a cyber attack targeting an aerospace organization in the U.S. as part of what’s suspected to be a cyber espionage mission. The BlackBerry Threat Research and Intelligence team is tracking the activity cluster as AeroBlade. Its origin is currently […]
Dec 05, 2023NewsroomEmail Security / Vulnerability Microsoft on Monday said it detected Kremlin-backed nation-state activity exploiting a critical security flaw in its Outlook email service to gain unauthorized access to victims’ accounts within Exchange servers. The tech giant attributed the intrusions to a threat actor it called Forest Blizzard (formerly Strontium), which is also widely […]
The efforts of the International Committee of the Red Cross (ICRC) to establish rules of engagement to combatants in a cyberwar should be applauded internationally, even if adherence is likely to be limited. The ICRC recently released a set of rules for civilian hackers involved in conflicts to follow in order to clarify the line between civilians […]
The attacks involve the use of weaponized documents with malicious macros that create a reverse shell, allowing the attackers to gain control over the compromised systems.
The BlackCat ransomware group has reportedly targeted Ho Chi Minh City Energy Company, a subsidiary of Vietnam Electricity. The alleged EVNHCMC data breach has raised concerns, prompting the hacker group ALPHV to threaten to report the incident to the Vietnam Department of Energy. The situation is unfolding, with 84 samples from the Vietnam Electricity data […]