Latest Cybersecurity News and Articles


Change Healthcare Breach Hits 100M Americans

30 October 2024
Change Healthcare says it has notified approximately 100 million Americans that their personal, financial and healthcare records may have been stolen in a February 2024 ransomware attack that caused the largest ever known data breach of protected health information.

Opera Browser Fixes Big Security Hole That Could Have Exposed Your Information

30 October 2024
A now-patched security flaw in the Opera web browser could have enabled a malicious extension to gain unauthorized, full access to private APIs. The attack, codenamed CrossBarking, could have made it possible to conduct actions such as capturing screenshots, modifying browser settings, and account hijacking, Guardio Labs said. To demonstrate the issue, the company said it managed to publish a

Malvertising Campaign Hijacks Facebook Accounts to Spread SYS01stealer Malware

30 October 2024
Cybersecurity researchers have uncovered an ongoing malvertising campaign that abuses Meta's advertising platform and hijacked Facebook accounts to distribute information known as SYS01stealer. "The hackers behind the campaign use trusted brands to expand their reach," Bitdefender Labs said in a report shared with The Hacker News. "The malvertising campaign leverages nearly a hundred malicious

Researchers Uncover Python Package Targeting Crypto Wallets with Malicious Code

30 October 2024
Cybersecurity researchers have discovered a new malicious Python package that masquerades as a cryptocurrency trading tool but harbors functionality designed to steal sensitive data and drain assets from victims' crypto wallets. The package, named "CryptoAITools," is said to have been distributed via both Python Package Index (PyPI) and bogus GitHub repositories. It was downloaded over 1,300

Embarking on a Compliance Journey? Here’s How Intruder Can Help

30 October 2024
Navigating the complexities of compliance frameworks like ISO 27001, SOC 2, or GDPR can be daunting. Luckily, Intruder simplifies the process by helping you address the key vulnerability management criteria these frameworks demand, making your compliance journey much smoother. Read on to understand how to meet the requirements of each framework to keep your customer data safe. How Intruder

Software and IT vendors linked to 67% of energy sector breaches

30 October 2024
Two-thirds (67%) of third-party energy sector breaches were caused by software and IT vendors. 

Researchers Uncover Vulnerabilities in Open-Source AI and ML Models

29 October 2024
A little over three dozen security vulnerabilities have been disclosed in various open-source artificial intelligence (AI) and machine learning (ML) models, some of which could lead to remote code execution and information theft. The flaws, identified in tools like ChuanhuChatGPT, Lunary, and LocalAI, have been reported as part of Protect AI's Huntr bug bounty platform. The most severe of the

31 new ransomware groups were discovered in 2024

29 October 2024
A report by Secureworks revealed a 30% year-over-year rise in active ransomware groups, which demonstrates fragmentation of an established criminal ecosystem.

Security leaders discuss the Cisco security incident

29 October 2024
Security leaders discuss the recent Cisco security incident. 

A Sherlock Holmes Approach to Cybersecurity: Eliminate the Impossible with Exposure Validation

29 October 2024
Sherlock Holmes is famous for his incredible ability to sort through mounds of information; he removes the irrelevant and exposes the hidden truth. His philosophy is plain yet brilliant: “When you have eliminated the impossible, whatever remains, however improbable, must be the truth.” Rather than following every lead, Holmes focuses on the details that are needed to move him to the solution. In

Dutch Police Disrupt Major Info Stealers RedLine and MetaStealer in Operation Magnus

29 October 2024
The Dutch National Police, along with international partners, have announced the disruption of the infrastructure powering two information stealers tracked as RedLine and MetaStealer. The takedown, which took place on October 28, 2024, is the result of an international law enforcement task force codenamed Operation Magnus that involved authorities from the U.S., the U.K., Belgium, Portugal, and

U.S. Government Issues New TLP Guidance for Cross-Sector Threat Intelligence Sharing

29 October 2024
The U.S. government (USG) has issued new guidance governing the use of the Traffic Light Protocol (TLP) to handle the threat intelligence information shared between the private sector, individual researchers, and Federal Departments and Agencies. "The USG follows TLP markings on cybersecurity information voluntarily shared by an individual, company, or other any organization, when not in

New Research Reveals Spectre Vulnerability Persists in Latest AMD and Intel Processors

29 October 2024
More than six years after the Spectre security flaw impacting modern CPU processors came to light, new research has found that the latest AMD and Intel processors are still susceptible to speculative execution attacks. The attack, disclosed by ETH Zürich researchers Johannes Wikner and Kaveh Razavi, aims to undermine the Indirect Branch Predictor Barrier (IBPB) on x86 chips, a crucial mitigation

Chinese Hackers Use CloudScout Toolset to Steal Session Cookies from Cloud Services

28 October 2024
A government entity and a religious organization in Taiwan were the target of a China-linked threat actor known as Evasive Panda that infected them with a previously undocumented post-compromise toolset codenamed CloudScout. "The CloudScout toolset is capable of retrieving data from various cloud services by leveraging stolen web session cookies," ESET security researcher Anh Ho said. "Through

Cyber Essentials scheme marks a decade of boosting businesses’ cyber defences

28 October 2024
Following the 10 successful years of the Cyber Essentials scheme, more businesses urged to strengthen cyber security protections

Russian Espionage Group Targets Ukrainian Military with Malware via Telegram

28 October 2024
A suspected Russian hybrid espionage and influence operation has been observed delivering a mix of Windows and Android malware to target the Ukrainian military under the Telegram persona Civil Defense. Google's Threat Analysis Group (TAG) and Mandiant are tracking the activity under the name UNC5812. The threat group, which operates a Telegram channel named civildefense_com_ua, was created on

BeaverTail Malware Resurfaces in Malicious npm Packages Targeting Developers

28 October 2024
Three malicious packages published to the npm registry in September 2024 have been found to contain a known malware called BeaverTail, a JavaScript downloader and information stealer linked to an ongoing North Korean campaign tracked as Contagious Interview. The Datadog Security Research team is monitoring the activity under the name Tenacious Pungsan, which is also known by the monikers

Only 24% of organizations are 'very confident' in their AI policies

28 October 2024
According to recent data, a wave of artificial intelligence (AI) adoption is radically shifting how software goes from ideation to deployment.

THN Cybersecurity Recap: Top Threats, Tools and News (Oct 21 - Oct 27)

28 October 2024
Cybersecurity news can sometimes feel like a never-ending horror movie, can't it? Just when you think the villains are locked up, a new threat emerges from the shadows. This week is no exception, with tales of exploited flaws, international espionage, and AI shenanigans that could make your head spin. But don't worry, we're here to break it all down in plain English and arm you with the

Cybercriminals Use Webflow to Deceive Users into Sharing Sensitive Login Credentials

28 October 2024
Cybersecurity researchers have warned of a spike in phishing pages created using a website builder tool called Webflow, as threat actors continue to abuse legitimate services like Cloudflare and Microsoft Sway to their advantage. "The campaigns target sensitive information from different crypto wallets, including Coinbase, MetaMask, Phantom, Trezor, and Bitbuy, as well as login credentials for