Trend Micro uncovered a method that nation-state threat actors are using to target victims via the Windows .Ink shortcut file extension. Go to Source Author: Alexander Culafi, Senior News Writer, Dark Reading
Category Archives: Uncategorized
Several major companies in the finance sector were impacted by the third-party breach, prompting them to notify thousands of customers of their compromised data. Go to Source Author: Kristina Beek, Associate Editor, Dark Reading
Research finds that organizations are granting root access by default and making other big missteps, including a Jenga-like building concept, in deploying and configuring AI services in cloud deployments. Go to Source Author: Elizabeth Montalbano, Contributing Writer
Threat actors are exploiting a severe security flaw in PHP to deliver cryptocurrency miners and remote access trojans (RATs) like Quasar RAT. The vulnerability, assigned the CVE identifier CVE-2024-4577, refers to an argument injection vulnerability in PHP affecting Windows-based systems running in CGI mode that could allow remote attackers to run arbitrary code. Cybersecurity company […]
The question is no longer “Are we compliant?” but “Are we truly resilient?” Go to Source Author: Victoria Dimmick
The recently leaked trove of internal chat logs among members of the Black Basta ransomware operation has revealed possible connections between the e-crime gang and Russian authorities. The leak, containing over 200,000 messages from September 2023 to September 2024, was published by a Telegram user @ExploitWhispers last month. According to an analysis of the messages […]
In today’s digital world, security breaches are all too common. Despite the many security tools and training programs available, identity-based attacks—like phishing, adversary-in-the-middle, and MFA bypass—remain a major challenge. Instead of accepting these risks and pouring resources into fixing problems after they occur, why not prevent attacks from happening in the first place? Our upcoming […]
The threat actors behind the ClearFake campaign are using fake reCAPTCHA or Cloudflare Turnstile verifications as lures to trick users into downloading malware such as Lumma Stealer and Vidar Stealer. ClearFake, first highlighted in July 2023, is the name given to a threat activity cluster that employs fake web browser update baits on compromised WordPress […]
