Latest Cybersecurity News and Articles


Ransomware Operations are Becoming Less Profitable

08 May 2024
Ransomware operations are experiencing a decline in profitability due to various factors such as increased cyber resilience of organizations, the availability of decryptors, and more frequent law enforcement actions.

Update: MITRE Attributes the Recent Attack to China-linked UNC5221

08 May 2024
The attackers exploited two zero-day vulnerabilities in Ivanti Connect Secure to gain initial access to MITRE's Networked Experimentation, Research, and Virtualization Environment (NERVE) in late December 2023.

Scattered Spider Group a Unique Challenge for Cyber Cops, FBI Leader Says

08 May 2024
Identified by analysts in 2022, the hackers use social engineering to lure users into giving up their login credentials or one-time password codes to bypass multifactor authentication.

Hackers Exploit LiteSpeed Cache Flaw to Create WordPress Admins

08 May 2024
WPScan observed in April increased exploitation activity against WordPress sites with versions of the plugin older than 5.7.0.1, which are vulnerable to a high-severity (8.8) unauthenticated cross-site scripting flaw tracked as CVE-2023-40000.

Law Enforcement Agencies Identified LockBit Ransomware Admin and Sanctioned Him

08 May 2024
The FBI, UK National Crime Agency, and Europol have unmasked the identity of the admin of the LockBit ransomware operation, aka ‘LockBitSupp’ and ‘putinkrab’, and issued sanctions against him.

Over 50,000 Tinyproxy Servers Vulnerable to Critical RCE Flaw

08 May 2024
A critical remote code execution (RCE) flaw, CVE-2023-49606, was found affecting nearly 52,000 Tinyproxy servers. This vulnerability was disclosed by Cisco Talos in December 2023, impacting versions 1.11.1 and 1.10.0 of Tinyproxy.

Hackers Exploiting LiteSpeed Cache Bug to Gain Full Control of WordPress Sites

08 May 2024
A high-severity flaw impacting the LiteSpeed Cache plugin for WordPress is being actively exploited by threat actors to create rogue admin accounts on susceptible websites. The findings come from WPScan, which said that the vulnerability (CVE-2023-40000, CVSS score: 8.3) has been leveraged to set up bogus admin users with the names wpsupp‑user 

Data breaches increased throughout 2023

08 May 2024
Companies experience a rise in data breaches.

Vulnerability exploitation on the rise

08 May 2024
The most commonly exploited vulnerabilities.

AT&T Splits Cybersecurity Services Business, Launches LevelBlue

07 May 2024
AT&T has split its cybersecurity services business to form a new company called LevelBlue. It includes AT&T's managed security services business, cybersecurity consulting business, and assets from the acquisition of AlienVault in 2018.

U.S. Charges Russian Man as Boss of LockBit Ransomware Group

07 May 2024
The United States joined the United Kingdom and Australia today in sanctioning 31-year-old Russian national Dmitry Yuryevich Khoroshev as the alleged leader of the infamous ransomware group LockBit. The U.S. Department of Justice also indicted Khoroshev as the gang's leader "LockbitSupp," and charged him with using Lockbit to attack more than 2,000 victims and extort at least $100 million in ransomware payments.

Germany Recalls Ambassador to Russia Over Cyberattacks

07 May 2024
Germany has recalled its ambassador to Russia in response to alleged Moscow-backed cyberattacks targeting various sectors in Germany, including defense, aerospace, and IT companies, as well as the German Social Democratic Party.

Report: Only 45% of Organizations Use MFA to Protect Against Fraud

07 May 2024
A report by Ping Identity highlighted the pressing need for enhanced identity protection strategies, as 97% of organizations struggle with identity verification, and 48% lack confidence in defending against AI-related attacks.

Russian Hacker Dmitry Khoroshev Unmasked as LockBit Ransomware Administrator

07 May 2024
The U.K. National Crime Agency (NCA) has unmasked the administrator and developer of the LockBit ransomware operation, revealing it to be a 31-year-old Russian national named Dmitry Yuryevich Khoroshev. In addition, Khoroshev has been sanctioned by the U.K. Foreign, Commonwealth and Development Office (FCD), the U.S. Department of the Treasury’s Office of Foreign Assets Control (

White House in Talks With Industry to Build Legal Framework for Software Liability

07 May 2024
The White House is engaging with the tech industry to establish a legal framework for software liability as part of a broader cybersecurity strategy, aiming to incentivize software developers to create products without exploitable security flaws.

DBIR: Supply Chain Breaches up 68% Year Over Year

07 May 2024
According to Verizon's latest Data Breach Investigations Report (DBIR), supply chain breaches increased by 68% year-over-year, primarily due to software vulnerabilities exploited in ransomware and extortion attacks.

Russian Operator of BTC-e Crypto Exchange Pleads Guilty to Money Laundering

07 May 2024
The U.S. Department of Justice stated that BTC-e was a primary method for cybercriminals to transfer and launder illegal proceeds. Vinnik's actions led to a loss of at least $121 million through BTC-e.

APT42 Hackers Pose as Journalists to Harvest Credentials and Access Cloud Data

07 May 2024
The Iranian state-backed hacking outfit called APT42 is making use of enhanced social engineering schemes to infiltrate target networks and cloud environments. Targets of the attack include Western and Middle Eastern NGOs, media organizations, academia, legal services and activists, Google Cloud subsidiary Mandiant said in a report published last week. "APT42 was

Synopsys to Sell its Software Integrity Business to Clearlake Capital and Francisco Partners

07 May 2024
After the transaction, the business will operate independently as an application security testing software provider, with the current management team expected to lead the new entity.

China-Linked Hackers Used ROOTROT Webshell in MITRE Network Intrusion

07 May 2024
The MITRE Corporation has offered more details into the recently disclosed cyber attack, stating that the first evidence of the intrusion now dates back to December 31, 2023. The attack, which came to light last month, singled out MITRE's Networked Experimentation, Research, and Virtualization Environment (NERVE) through the exploitation of two Ivanti Connect Secure zero-day