Latest Cybersecurity News and Articles


Exploitation of vulnerability affecting Palo Alto GlobalProtect Gateway

22 April 2024
The NCSC is encouraging organisations to take immediate action to mitigate a vulnerability affecting Palo Alto GlobalProtect Gateway and to follow the latest vendor advice.

Malware Developer Lures Child Exploiters Into Honeytrap to Extort Them

22 April 2024
Threat actors created a website to impersonate UsenetClub, a subscription service for "uncensored" access to images and videos downloaded from Usenet. They claimed to provide free access to the site after the installation of a "CryptVPN" software.

Researchers Uncover Windows Flaws Granting Hackers Rootkit-Like Powers

22 April 2024
New research has found that the DOS-to-NT path conversion process could be exploited by threat actors to achieve rootkit-like capabilities to conceal and impersonate files, directories, and processes.

Ukrainian Soldiers’ Apps Increasingly Targeted for Spying, Cyber Agency Warns

22 April 2024
The agency is attributing the surge to a group tracked as UAC-0184, which was spotted in February targeting an unnamed Ukrainian entity in Finland. CERT-UA does not attribute UAC-0184’s activity to any specific foreign cyber threat group.

Pentera's 2024 Report Reveals Hundreds of Security Events per Week, Highlighting the Criticality of Continuous Validation

22 April 2024
Over the past two years, a shocking 51% of organizations surveyed in a leading industry report have been compromised by a cyberattack. Yes, over half.  And this, in a world where enterprises deploy an average of 53 different security solutions to safeguard their digital domain.  Alarming? Absolutely. A recent survey of CISOs and CIOs, commissioned by Pentera and

UK Cyber Agency NCSC Announces Richard Horne as its Next Chief Executive

22 April 2024
The hire marks another coup for the British public sector in poaching talent from the technology industry, particularly at the executive level, following the recruitment of Ollie Whitehouse as the NCSC’s chief technology officer earlier this year.

MITRE Corporation Breached by Nation-State Hackers Exploiting Ivanti Flaws

22 April 2024
The MITRE Corporation revealed that it was the target of a nation-state cyber attack that exploited two zero-day flaws in Ivanti Connect Secure appliances starting in January 2024. The intrusion led to the compromise of its Networked Experimentation, Research, and Virtualization Environment (NERVE), an unclassified research and prototyping network. The unknown adversary "performed reconnaissance

Researchers Find Dozens of Fake E-Zpass Toll Websites After FBI Warning

22 April 2024
Researchers from cybersecurity firm DomainTools told Recorded Future News that they have found nearly 30 newly created domains related to tolls, 15 of which have a “high chance of being weaponized for phishing, malware, or spam.”

Report: 51% of Enterprises Experienced a Breach Despite Large Security Stacks

22 April 2024
Threat actors are continuing to successfully breach across the entire attack surface. Around 93% of enterprises who admitted a breach reported unplanned downtime, data exposure, or financial loss as a result, according to a survey by Pentera.

Ransomware Double-Dip: Re-Victimization in Cyber Extortion

22 April 2024
Between crossovers - Do threat actors play dirty or desperate? In our dataset of over 11,000 victim organizations that have experienced a Cyber Extortion/ Ransomware attack, we noticed that some victims re-occur. Consequently, the question arises why we observe a re-victimization and whether or not this is an actual second attack, an affiliate crossover (meaning an affiliate has gone to

Critical Flaw in the Forminator Plugin Impacts Hundreds of Thousands of WordPress Sites

22 April 2024
Japan’s CERT warned that the WordPress plugin Forminator, developed by WPMU DEV, is affected by multiple vulnerabilities, including a flaw that allows unrestricted file uploads to the server.

Rising Ransomware Issue: English-Speaking Western Affiliates

22 April 2024
Security experts say Western teenagers comprise a number of active affiliate groups, many with ties to the cybercrime community that calls itself "The Community," aka the Com or Comm.

Researchers Uncover Windows Flaws Granting Hackers Rootkit-Like Powers

22 April 2024
New research has found that the DOS-to-NT path conversion process could be exploited by threat actors to achieve rootkit-like capabilities to conceal and impersonate files, directories, and processes. "When a user executes a function that has a path argument in Windows, the DOS path at which the file or folder exists is converted to an NT path," SafeBreach security researcher Or Yair said&

JavaScript Malware Switches to Server-Side Redirects and Uses DNS TXT Records as TDS

22 April 2024
A malware campaign was found injecting malicious JavaScript code into compromised WordPress sites to redirect site visitors to VexTrio domains, specifically using dynamic DNS TXT records of the tracker-cloud[.]com domain to obtain redirect URLs.

NATO to Launch New Cyber Center to Contest Cyberspace ‘At All Times'

22 April 2024
The new facility, details about which have not previously been reported, marks the fruition of a significant doctrinal shift in how the alliance approaches operations in cyberspace.

HelloKitty Ransomware Rebrands, Releases CD Projekt and Cisco Data

22 April 2024
An operator of the HelloKitty ransomware operation announced they changed the name to 'HelloGookie,' releasing passwords for previously leaked CD Projekt source code, Cisco network information, and decryption keys from old attacks.

Jury Dishes Out Guilty Verdict in Mango Markets Fraud Case

22 April 2024
A New York federal jury found a hacker guilty of all charges that he masterminded and carried out a scheme to fraudulently obtain $110 million from cryptocurrency exchange Mango Markets and investors.

Microsoft Warns: North Korean Hackers Turn to AI-Fueled Cyber Espionage

22 April 2024
Microsoft has revealed that North Korea-linked state-sponsored cyber actors has begun to use artificial intelligence (AI) to make its operations more effective and efficient. "They are learning to use tools powered by AI large language models (LLM) to make their operations more efficient and effective," the tech giant said in its latest report on East Asia hacking groups. The company

New RedLine Stealer Variant Disguised as Game Cheats Using Lua Bytecode for Stealth

21 April 2024
A new information stealer has been found leveraging Lua bytecode for added stealth and sophistication, findings from McAfee Labs reveal. The cybersecurity firm has assessed it to be a variant of a known malware called RedLine Stealer owing to the fact that the command-and-control (C2) server IP address has been previously identified as associated with the malware. RedLine Stealer, 

CrushFTP Warns Users to Patch Exploited Zero-Day “Immediately”

20 April 2024
As the company also explains in a public security advisory published on Friday, this zero-day bug enables unauthenticated attackers to escape the user's virtual file system (VFS) and download system files.