Latest Cybersecurity News and Articles


eScan Antivirus Update Mechanism Exploited to Spread Backdoors and Miners

24 April 2024
A new malware campaign has been exploiting the updating mechanism of the eScan antivirus software to distribute backdoors and cryptocurrency miners like XMRig through a long-standing threat codenamed GuptiMiner targeting large corporate networks. Cybersecurity firm Avast said the activity is the work of a threat actor with possible connections to a North Korean hacking group dubbed 

Study: GPT-4 Agent can Exploit Unpatched Vulnerabilities

24 April 2024
Academics at a U.S. university found that if you feed a GPT-4 artificial intelligence agent public security advisories, it can exploit unpatched "real-world" vulnerabilities without precise technical information.

CoralRaider Malware Campaign Exploits CDN Cache to Spread Info-Stealers

24 April 2024
A new ongoing malware campaign has been observed distributing three different stealers, such as CryptBot, LummaC2, and Rhadamanthys hosted on Content Delivery Network (CDN) cache domains since at least February 2024. Cisco Talos has attributed the activity with moderate confidence to a threat actor tracked as CoralRaider, a suspected Vietnamese-origin

This Website is Selling Billions of Private Messages of Discord Users

23 April 2024
The website Spy.pet has been involved in a major privacy breach, selling billions of private messages from Discord users. This breach exposes personal information, private photos, financial details, and potentially company secrets.

Vulnerability Exploitation on the Rise as Attackers Ditch Phishing

23 April 2024
In a move away from traditional phishing scams, attackers are increasingly exploiting vulnerabilities in computer systems to gain initial network access, according to Mandiant’s M-Trends 2024 Report.

Russian APT28 Group in New “GooseEgg” Hacking Campaign

23 April 2024
A notorious Russian APT group has been stealing credentials for years by exploiting a Windows Print Spooler bug and using a novel post-compromise tool known as “GooseEgg,” Microsoft has revealed.

CISA to Issue List of Software Products Critical to Agency Security by End of September

23 April 2024
The Cybersecurity and Infrastructure Security Agency is targeting a September 30 deadline to give federal agencies a list of example software products deemed critical for the federal government’s cyber posture.

GuptiMiner: Hijacking Antivirus Updates for Distributing Backdoors and Casual Mining

23 April 2024
The GuptiMiner malware campaign, discovered by Avast, involved hijacking an eScan antivirus update mechanism to distribute backdoors and coinminers. The campaign was orchestrated by a threat actor with possible ties to Kimsuky.

New research discovers vulnerability in an archived Apache project

23 April 2024
Research has discovered a vulnerability in an Apache project that could lead to remote code execution inside of the production environment. 

Apache Cordova App Harness Targeted in Dependency Confusion Attack

23 April 2024
Researchers have identified a dependency confusion vulnerability impacting an archived Apache project called Cordova App Harness. Dependency confusion attacks take place owing to the fact that package managers check the public repositories before private registries, thus allowing a threat actor to publish a malicious package with the same name to a public package repository. This&

Fraudsters Exploit Telegram’s Popularity for Toncoin Scam

23 April 2024
The perpetrators attract unsuspecting Telegram users through a referral system, enticing them with promises of an “exclusive earning program” shared via contacts in their network.

Nespresso Domain Serves Up Steamy Cup of Phish, No Cream or Sugar

23 April 2024
A phishing campaign exploiting a bug in Nespresso's website has been able to evade detection by taking advantage of security tools that fail to look for malicious nested or hidden links.

73% of security professionals failed to act during security alert

23 April 2024
Security leaders in small and medium-sized enterprises are overwhelmed by the volume and complexity of security demands.

88% of respondents will focus security investments on cloud security

23 April 2024
According to a recent cybersecurity priorities report, security analysts maintain that up to 57% of their daily tasks could be automated.

Microsoft Warns of North Korean Hackers Turning to AI-Fueled Cyber Espionage

23 April 2024
Microsoft specifically highlighted a group named Emerald Sleet (aka Kimusky or TA427), which has been observed using LLMs to bolster spear-phishing efforts aimed at Korean Peninsula experts.

Webinar: Learn Proactive Supply Chain Threat Hunting Techniques

23 April 2024
In the high-stakes world of cybersecurity, the battleground has shifted. Supply chain attacks have emerged as a potent threat, exploiting the intricate web of interconnected systems and third-party dependencies to breach even the most formidable defenses. But what if you could turn the tables and proactively hunt these threats before they wreak havoc? We invite you to join us for an

Behavioral Patterns of Ransomware Groups are Changing

23 April 2024
The ransomware landscape has undergone significant changes in Q1 2024, with major shifts in the behavior of Ransomware-as-a-Service (RaaS) groups, according to GuidePoint Security's GRIT Q1 2024 Ransomware Report.

Russian Sandworm Hackers Targeted 20 Critical Organizations in Ukraine

23 April 2024
CERT-UA reports that in March 2024, APT44 conducted operations to disrupt information and communication systems at energy, water, and heating suppliers in 10 regions of Ukraine.

HHS Beefs Up Privacy Protection for Reproductive Health Info

23 April 2024
Doctors, clinics and other providers are prohibited from disclosing protected health information related to lawful reproductive healthcare, according to a final rule released Monday by federal regulators to "strengthen" HIPAA privacy.

Unmasking the True Cost of Cyberattacks: Beyond Ransom and Recovery

23 April 2024
Cybersecurity breaches can be devastating for both individuals and businesses alike. While many people tend to focus on understanding how and why they were targeted by such breaches, there's a larger, more pressing question: What is the true financial impact of a cyberattack? According to research by Cybersecurity Ventures, the global cost of cybercrime is projected to reach