The FBI seized 32 web domains used by the Doppelgänger Russian-linked influence operation network in a disinformation campaign targeting the American public ahead of this year’s presidential election. […] Go to Source Author: Sergiu Gatlan
Author Archives: Onsite Computing, Inc.
Adversaries reusing abandoned package names sneak malware into organizations in a sort of software shell game. Go to Source Author: Jai Vijayan, Contributing Writer
Researchers at Trusec recently discovered a new ransomware-as-a-service group called Cicada3301. The gang provides its affiliates with a dual extortion platform that includes both a ransomware and a data leakage side. According to the research report, Cicada3301 first appeared in June 2024 and specializes in Windows and Linux ESXi hosts. Similarities to AlphV In their analysis, the security researchers […]
Cisco has fixed a command injection vulnerability in the Identity Services Engine (ISE) with public exploit code that lets attackers escalate privileges to root on vulnerable systems. […] Go to Source Author: Sergiu Gatlan
Researchers have identified an attack that impersonates tax authorities from several countries to compromise organizations and deploy a custom backdoor program dubbed Voldemort. While the campaign uses tactics seen in financially motivated cybercrime attacks, the researchers believe the true purpose is likely espionage based on the characteristics of the deployed malware. The campaign’s targeting is […]
The Dutch Data Protection Authority, Autoriteit Persoonsgegevens, is the latest European regulator to crack down on American face-recognition firm Clearview AI, levying a €30.5 million (US$33.8 million) fine that is likely to grow to €35.5 million due to additional penalties for non-compliance. Of potentially greater concern to US businesses considering violating the privacy of Dutch […]
A new “EUCLEAK” flaw found in FIDO devices using the Infineon SLE78 security microcontroller, like Yubico’s YubiKey 5 Series, allows attackers to extract Elliptic Curve Digital Signature Algorithm (ECDSA) secret keys and clone the FIDO device. […] Go to Source Author: Bill Toulas
Cisco has removed a backdoor account in the Cisco Smart Licensing Utility (CSLU) that can be used to log into unpatched systems with administrative privileges. […] Go to Source Author: Sergiu Gatlan
Sophisticated social engineering is expected to accompany threat campaigns that are highly targeted and aimed at stealing crypto and deploying malware. Go to Source Author: Elizabeth Montalbano, Contributing Writer
“Another day, another vulnerability” is a familiar refrain among security teams worldwide. One of the most intriguing findings from our latest Fortinet Global Threat Landscape Report is that attackers are exploiting vulnerabilities faster than ever before. This average time-to-exploitation, 4.76 days, is 43% faster than our FortiGuard Labs team observed in the first half of […]
