Latest Cybersecurity News and Articles


AI-as-a-Service Platform Patches Critical RCE Vulnerability

27 May 2024
Attackers could have exploited a now-mitigated critical vulnerability in the Replicate artificial intelligence platform to access private AI models and sensitive data, including proprietary knowledge and personally identifiable information.

Stark Industries Solutions: An Iron Hammer in the Cloud

27 May 2024
An investigation into Stark Industries reveals it is being used as a global proxy network that conceals the true source of cyberattacks and disinformation campaigns against enemies of Russia.

New Tricks in the Phishing Playbook: Cloudflare Workers, HTML Smuggling, GenAI

27 May 2024
Cybersecurity researchers are alerting of phishing campaigns that abuse Cloudflare Workers to serve phishing sites that are used to harvest users' credentials associated with Microsoft, Gmail, Yahoo!, and cPanel Webmail. The attack method, called transparent phishing or adversary-in-the-middle (AitM) phishing, "uses Cloudflare Workers to act as a reverse proxy server for a

High-Severity Flaw Affects Cisco Firepower Management Center

27 May 2024
Cisco states that there are no workarounds that address this vulnerability. The IT giant has confirmed that this vulnerability does not affect Adaptive Security Appliance (ASA) Software or Firepower Threat Defense (FTD) Software.

Pakistan-linked Hackers Deploy Python, Golang, and Rust Malware on Indian Targets

27 May 2024
The Pakistan-nexus Transparent Tribe actor has been linked to a new set of attacks targeting Indian government, defense, and aerospace sectors using cross-platform malware written in Python, Golang, and Rust. "This cluster of activity spanned from late 2023 to April 2024 and is anticipated to persist," the BlackBerry Research and Intelligence Team said in a technical report

Experts Find Flaw in Replicate AI Service Exposing Customers' Models and Data

25 May 2024
Cybersecurity researchers have discovered a critical security flaw in an artificial intelligence (AI)-as-a-service provider Replicate that could have allowed threat actors to gain access to proprietary AI models and sensitive information. "Exploitation of this vulnerability would have allowed unauthorized access to the AI prompts and results of all Replicate's platform customers,"

Cybercriminals Exploit Cloud Storage for SMS Phishing Scams

25 May 2024
Security researchers have revealed a series of criminal campaigns that exploit cloud storage services such as Amazon S3, Google Cloud Storage, Backblaze B2 and IBM Cloud Object Storage.

NSA Issues Guidance for Maturing Application, Workload Capabilities Under Zero Trust; Dave Luber Quoted

25 May 2024
“This guidance helps organizations disrupt malicious cyber activity by applying granular access control and visibility to applications and workloads in modern network environments,” said Dave Luber, director of cybersecurity at NSA.

Beware of HTML Masquerading as PDF Viewer Login Pages

25 May 2024
Forcepoint X-Labs has recently observed a significant number of phishing email instances in their telemetry targeting various government departments in APAC that masquerade as PDF viewer login pages.

Sharp Dragon Expands Towards Africa and The Caribbean

25 May 2024
The threat actors demonstrate increased caution in selecting their targets, broadening their reconnaissance efforts, and adopting Cobalt Strike Beacon over custom backdoors.

Hackers Created Rogue VMs to Evade Detection in Recent MITRE Cyber Attack

24 May 2024
The MITRE Corporation has revealed that the cyber attack targeting the not-for-profit company towards late December 2023 by exploiting zero-day flaws in Ivanti Connect Secure (ICS) involved the actor creating rogue virtual machines (VMs) within its VMware environment. "The adversary created their own rogue VMs within the VMware environment, leveraging compromised vCenter Server access," MITRE

Security leaders are facing a new wave of identity risks

24 May 2024
A study has found that increased technological and organizational complexity is contributing to new identity risks that security leaders must manage. 

CISOs Pursuing AI Readiness Should Start by Updating Their Email Security Policy

24 May 2024
Effective, updated policies are foundational to an organization's cybersecurity strategy in this new era of AI-driven attacks. CISOs must proactively adapt their email security approach to protect against the latest social engineering threats.

BloodAlchemy Malware Used to Target Government Agencies in Southern and Southeastern Asia

24 May 2024
BLOODALCHEMY is an updated version of Deed RAT, which is believed to be a successor to ShadowPad malware. It has been used in attacks targeting government organizations in Southern and Southeastern Asia.

Morocco-based Cybercriminals Cashing in on Bold Gift Card Scams

24 May 2024
“Rather than scam or phish everyday people directly for gift card-based payments, Storm-0539 infiltrates large retailers and fraudulently issues gift card codes to themselves, virtually printing their own money,” Microsoft’s Vasu Jakkal explained.

Bugcrowd Buys Informer to Enhance Attack Surface Management

24 May 2024
Bugcrowd CEO Dave Gerry said their acquisition of Brighton, England-based Informer will fuel the adoption of Bugcrowd's penetration testing technology and prompt clients to expand the scope of their bug bounty programs.

Three-Year-Old Apache Flink Flaw Now Under Active Attack

24 May 2024
An improper access control bug in Apache Flink that was fixed in January 2021 has been added to the US government's Known Exploited Vulnerabilities Catalog, meaning criminals are right now abusing the flaw in the wild to compromise targets.

High-Severity GitLab Flaw Lets Attackers Take Over Accounts

24 May 2024
The security flaw (tracked as CVE-2024-4835) is an XSS weakness in the VS code editor (Web IDE) that lets threat actors steal restricted information using maliciously crafted pages.

Cyber Force Provision Gets House Committee’s Approval

24 May 2024
A requirement for the Pentagon to commission an independent study on the creation of a U.S. Cyber Force was added late Wednesday to the House version of the defense policy bill.

Google Fixes Eighth Actively Exploited Chrome Zero-Day This Year

24 May 2024
The security issue was discovered internally by Google's Clément Lecigne and is tracked as CVE-2024-5274. It is a high-severity 'type confusion' in V8, Chrome's JavaScript engine responsible for executing JS code.