Latest Cybersecurity News and Articles


Severe Flaws Disclosed in Brocade SANnav SAN Management Software

26 April 2024
Several security vulnerabilities disclosed in Brocade SANnav storage area network (SAN) management application could be exploited to compromise susceptible appliances. The 18 flaws impact all versions up to and including 2.3.0, according to independent security researcher Pierre Barre, who discovered and reported them. The issues range from incorrect firewall rules,

New Brokewell Malware Takes Over Android Devices, Steals Data

26 April 2024
The malware is delivered through a fake Google Chrome update that is shown while using the web browser. Brokewell is under active development and features a mix of extensive device takeover and remote control capabilities.

93% of security leaders anticipate daily AI attacks by 2025

26 April 2024
Security leaders predict that AI will become a more prevalent tool in the tool kit of cybercriminals, potentially powering a range of cyberattacks. 

North Korea's Lazarus Group Deploys New Kaolin RAT via Fake Job Lures

26 April 2024
The Lazarus Group's use of job offer lures to infiltrate targets is not new. Dubbed Operation Dream Job, the long-running campaign has a track record of using various social media and instant messaging platforms to deliver malware.

Godfather Banking Trojan Spawns 1.2K Samples Across 57 Countries

26 April 2024
First discovered in 2022, Godfather — which can record screens and keystrokes, intercepts 2FA calls and texts, initiates bank transfers, and more — has quickly become one of the most widespread malware-as-a-service offerings in cybercrime.

10 Critical Endpoint Security Tips You Should Know

26 April 2024
In today's digital world, where connectivity is rules all, endpoints serve as the gateway to a business’s digital kingdom. And because of this, endpoints are one of hackers' favorite targets.  According to the IDC, 70% of successful breaches start at the endpoint. Unprotected endpoints provide vulnerable entry points to launch devastating cyberattacks. With IT

New 'Brokewell' Android Malware Spread Through Fake Browser Updates

26 April 2024
Fake browser updates are being used to push a previously undocumented Android malware called Brokewell. "Brokewell is a typical modern banking malware equipped with both data-stealing and remote-control capabilities built into the malware," Dutch security firm ThreatFabric said in an analysis published Thursday. The malware is said to be in active development,

Researchers Found 18 Vulnerabilities in Brocade SANnav

26 April 2024
Three of the vulnerabilities could allow an attacker to send malicious data, intercept credentials sent in clear text, and potentially compromise the entire Fibre Channel infrastructure.

Palo Alto Networks Outlines Remediation for Critical PAN-OS Flaw Under Attack

26 April 2024
Palo Alto Networks has shared remediation guidance for a recently disclosed critical security flaw impacting PAN-OS that has come under active exploitation. The vulnerability, tracked as CVE-2024-3400 (CVSS score: 10.0), could be weaponized to obtain unauthenticated remote shell command execution on susceptible devices. It has been addressed in

Autodesk Hosting PDF Files Used in Microsoft Phishing Attacks

26 April 2024
Researchers discovered a sophisticated phishing campaign that is using compromised email accounts and Autodesk's file sharing platform to steal Microsoft login credentials from victims.

ThreatLocker Raises $115M in Series D Funding

26 April 2024
The round was led by existing investor General Atlantic, with participation from other major investors StepStone Group and the D. E. Shaw group. The company intends to use the funds to drive product innovation and accelerate its global expansion.

Researchers Sinkhole PlugX Malware Server With 2.5 Million Unique IPs

26 April 2024
Researchers have sinkholed a command and control server for a variant of the PlugX malware and observed in six months more than 2.5 million connections from unique IP addresses.

Hackers Exploiting WP-Automatic Plugin Bug to Create Admin Accounts on WordPress Sites

26 April 2024
A critical severity flaw (CVE-2024-27956) in the WP-Automatic plugin for WordPress allows threat actors to gain unauthorized access to WordPress sites, create admin-level user accounts, and potentially take full control of the affected sites.

Hackers Exploiting WP-Automatic Plugin Bug to Create Admin Accounts on WordPress Sites

26 April 2024
Threat actors are attempting to actively exploit a critical security flaw in the WP‑Automatic plugin for WordPress that could allow site takeovers. The shortcoming, tracked as CVE-2024-27956, carries a CVSS score of 9.9 out of a maximum of 10. It impacts all versions of the plugin prior to 3.9.2.0. "This vulnerability, a SQL injection (SQLi) flaw, poses a severe threat as

North Korea's Lazarus Group Deploys New Kaolin RAT via Fake Job Lures

25 April 2024
The North Korea-linked threat actor known as Lazarus Group employed its time-tested fabricated job lures to deliver a new remote access trojan called Kaolin RAT. The malware could, "aside from standard RAT functionality, change the last write timestamp of a selected file and load any received DLL binary from [command-and-control] server," Avast security researcher Luigino

The real space race: Inside geopolitics and security of a $1.8T industry

25 April 2024
In episode 22 of the Cybersecurity & Geopolitical Discussion, our trio of hosts debate the geopolitical and security dimensions of the current global space industry. 

FTC issues refunds to Ring customers following privacy settlement

25 April 2024
The FTC issues refunds after a settlement with Ring over charges the company allowed employees and contractors to access consumers’ private videos.

Network Threats: A Step-by-Step Attack Demonstration

25 April 2024
Follow this real-life network attack simulation, covering 6 steps from Initial Access to Data Exfiltration. See how attackers remain undetected with the simplest tools and why you need multiple choke points in your defense strategy. Surprisingly, most network attacks are not exceptionally sophisticated, technologically advanced, or reliant on zero-day tools that exploit

DOJ Arrests Founders of Crypto Mixer Samourai for $2 Billion in Illegal Transactions

25 April 2024
The U.S. Department of Justice (DoJ) on Wednesday announced the arrest of two co-founders of a cryptocurrency mixer called Samourai and seized the service for allegedly facilitating over $2 billion in illegal transactions and for laundering more than $100 million in criminal proceeds. To that end, Keonne Rodriguez, 35, and William Lonergan Hill, 65, have been charged

Attackers Leverage Black Hat SEO Techniques to Distribute Info-Stealer Malware

25 April 2024
Threat actors utilize fraudulent websites hosted on popular legitimate platforms to spread malware and steal data. To evade detection, attackers employ obfuscation methods and checks on referral URLs.