Latest Cybersecurity News and Articles


Update: Threat Actors Created Rogue VMs to Evade Detection During December 2023 Attack on MITRE

28 May 2024
According to the new update, threat actors exploited zero-day flaws in Ivanti Connect Secure (ICS) and created rogue virtual machines (VMs) within the organization’s VMware environment.

White House Announces Plans to Revamp Data Routing Security by Year-End

28 May 2024
The augmentations concern the Border Gateway Protocol, a backbone data transmission algorithm that determines the optimal path for data packets to move across networks, said National Cyber Director Harry Coker

Usage of TLS in DDNS Services leads to Information Disclosure in Multiple Vendors

28 May 2024
When DDNS is combined with automatic TLS certificate generation using ACME clients, the public Certificate Transparency logs can be abused by attackers to find vulnerable devices en masse.

Human Error Still Perceived as the Achilles’ Heel of Cybersecurity

28 May 2024
While fears of cyberattacks continue to rise, CISOs demonstrate increasing confidence in their ability to defend against these threats, reflecting a significant shift in the cybersecurity landscape, according to Proofpoint.

Phishing with Cloudflare Workers: Transparent Phishing and HTML Smuggling

28 May 2024
One campaign uses HTML smuggling to hide the phishing content from network inspection. The other uses a method called transparent phishing, where the attacker uses Cloudflare Workers to act as a reverse proxy server for a legitimate login page.

WordPress Plugin Exploited to Steal Credit Card Data from E-commerce Sites

28 May 2024
Unknown threat actors are abusing lesser-known code snippet plugins for WordPress to insert malicious PHP code in victim sites that are capable of harvesting credit card data. The campaign, observed by Sucuri on May 11, 2024, entails the abuse of a WordPress plugin called Dessky Snippets, which allows users to add custom PHP code. It has over 200 active installations.

TP-Link Gaming Router Vulnerability Exposes Users to Remote Code Attacks

28 May 2024
A maximum-severity security flaw has been disclosed in the TP-Link Archer C5400X gaming router that could lead to remote code execution on susceptible devices by sending specially crafted requests. The vulnerability, tracked as CVE-2024-5035, carries a CVSS score of 10.0. It impacts all versions of the router firmware including and prior to 1_1.1.6. It has 

Security leaders respond to ransomware attack on the City of Wichita

28 May 2024
Security leaders respond to the announcement that the City of Wichita, Kansas, was targeted by a ransomware attack. 

Australian Telecom Watchdog Sues Optus Over 2022 Data Breach

27 May 2024
The Australian Communications and Media Authority said it has filed proceedings against Optus in a federal court as the company failed to protect sensitive customer data during a data breach in September 2022 that affected close to 10 million people.

NVD Leaves Exploited Vulnerabilities Unchecked

27 May 2024
In the report published on May 23, VulnCheck showed that 30 out of 59 known exploited vulnerabilities (KEVs) registered since February 12 have not yet been analyzed by the NVD team.

Malicious PyPI Packages Targeting Highly Specific MacOS Machines

27 May 2024
Cybersecurity researchers at Datadog Security Labs discovered malicious software packages targeting MacOS users through the Python Package Index (PyPI) and NPM repository.

Moroccan Cybercrime Group Steals Up to $100K Daily Through Gift Card Fraud

27 May 2024
Microsoft is calling attention to a Morocco-based cybercrime group dubbed Storm-0539 that's behind gift card fraud and theft through highly sophisticated email and SMS phishing attacks. "Their primary motivation is to steal gift cards and profit by selling them online at a discounted rate," the company said in its latest Cyber Signals report. "We've seen some examples where

Worried About Job Security, Cyber Teams Hide Security Incidents

27 May 2024
The frequency and severity of attacks are increasing—yet most businesses remain unprepared, according to VikingCloud. Between a growing talent shortage, alert fatigue, and new sophisticated attack methods, companies are more susceptible than ever.

Report: The Dark Side of Phishing Protection

27 May 2024
The transition to the cloud, poor password hygiene and the evolution in webpage technologies have all enabled the rise in phishing attacks. But despite sincere efforts by security stakeholders to mitigate them - through email protection, firewall rules and employee education - phishing attacks are still a very risky attack vector. A new report by LayerX explores the state of

Hackers Phish Finance Organizations in the US and Europe Using Trojanized Minesweeper Clone

27 May 2024
CERT-UA reports that research following the initial discovery of this attack revealed at least five potential breaches by the same files in financial and insurance institutions across Europe and the United States.

Seizing Control of the Cloud Security Cockpit

27 May 2024
Cloud applications and SaaS tools have countless configuration options that are often poorly documented and can change frequently, making it difficult to ensure they are securely configured.

Fake Antivirus Websites Used to Distribute Info-Stealer Malware

27 May 2024
Researchers at Trellix Advanced Research Center spotted fake AV sites used to distribute info-stealers. The malicious websites hosted sophisticated malicious files such as APK, EXE, and Inno setup installer, including spying and stealer capabilities.

EU Wants Universities to Work with Intelligence Agencies to Protect Their Research

27 May 2024
Europe’s leading research universities should work more closely with the continent’s intelligence agencies to help secure their research from being stolen by hostile states, EU member states recommended this week.

Arc Browser’s Windows Launch Targeted by Google Ads Malvertising

27 May 2024
According to a report by Malwarebytes, cybercriminals prepared for the product launch, setting up malicious advertisements on Google Search to lure users looking to download the new web browser.

Fail2Ban: Ban hosts that cause multiple authentication errors

27 May 2024
Fail2Ban is an open-source tool that monitors log files and blocks IP addresses that exhibit repeated failed login attempts. It does this by updating firewall rules to reject new connections from those IP addresses for a configurable amount of time.