Russian Espionage Group Targets Ukrainian Military with Malware via Telegram
A suspected Russian hybrid espionage and influence operation has been observed delivering a mix of Windows and Android...
BeaverTail Malware Resurfaces in Malicious npm Packages Targeting Developers
Three malicious packages published to the npm registry in September 2024 have been found to contain a known...
Redline, Meta infostealer malware operations seized by police
The Dutch National Police seized the network infrastructure for the Redline and Meta infostealer malware operations in “Operation...
Instagram reveals it lowers quality of less popular videos
The revelation has sparked concern among some creators it may impact their reach on the platform. Source:: BBC...
THN Cybersecurity Recap: Top Threats, Tools and News (Oct 21 – Oct 27)
Cybersecurity news can sometimes feel like a never-ending horror movie, can’t it? Just when you think the villains...
Cybercriminals Use Webflow to Deceive Users into Sharing Sensitive Login Credentials
Cybersecurity researchers have warned of a spike in phishing pages created using a website builder tool called Webflow,...
Sailing the Seven Seas Securely from Port to Port – OT Access Security for Ships and Cranes
Operational Technology (OT) security has affected marine vessel and port operators, since both ships and industrial cranes are...
Buyer’s guide: High-performance computing (HPC) for AI
High-performance computing (HPC) requires powerful servers running the fastest processors (typically GPUs, which are specialized graphics processing chips)....
Researchers Uncover OS Downgrade Vulnerability Targeting Microsoft Windows Kernel
A new attack technique could be used to bypass Microsoft’s Driver Signature Enforcement (DSE) on fully patched Windows...
Windows 11 24H2: The hardware and software blocking the new update
Windows 11 24H2 is unavailable for thousands of users due to safeguard or compatibility holds Microsoft has placed...
Fog ransomware targets SonicWall VPNs to breach corporate networks
Fog and Akira ransomware operators have increased their exploitation efforts of CVE-2024-40766, a critical access control flaw that...
New Cisco ASA and FTD features block VPN brute-force password attacks
Cisco has added new security features that significantly mitigate brute-force and password spray attacks on Cisco ASA and Firepower...
New Windows Driver Signature bypass allows kernel rootkit installs
Attackers can downgrade Windows kernel components to bypass security features such as Driver Signature Enforcement and deploy rootkits...
Over 70 zero-day flaws get hackers $1 million at Pwn2Own Ireland
The fourth day of Pwn2Own Ireland 2024 marked the end of the hacking competition with more than $1...
Notorious Hacker Group TeamTNT Launches New Cloud Attacks for Crypto Mining
The infamous cryptojacking group known as TeamTNT appears to be readying for a new large-scale campaign targeting cloud-native...
Four REvil Ransomware Members Sentenced in Rare Russian Cybercrime Convictions
Four members of the now-defunct REvil ransomware operation have been sentenced to several years in prison in Russia,...
CERT-UA Identifies Malicious RDP Files in Latest Attack on Ukrainian Entities
The Computer Emergency Response Team of Ukraine (CERT-UA) has detailed a new malicious email campaign targeting government agencies,...
‘I can’t run a business like this’: Why the WordPress row matters
WordPress’s tools are used by 40% of the world’s websites, making this a spat with big consequences. Source::...
Black Basta ransomware poses as IT support on Microsoft Teams to breach networks
The BlackBasta ransomware operation has moved its social engineering attacks to Microsoft Teams, posing as corporate help desks...
Black Basta poses as IT support on Microsoft Teams to breach networks
The BlackBasta ransomware operation has moved its social engineering attacks to Microsoft Teams, posing as corporate help desk...