Latest Cybersecurity News and Articles


NCSC joins industry to offer unprecedented protection for public from scams

17 December 2024
Data sharing collaboration will allow ISPs to instantly block access to fraudulent sites.

Bitter APT Targets Turkish Defense Sector with WmRAT and MiyaRAT Malware

17 December 2024
A suspected South Asian cyber espionage threat group known as Bitter targeted a Turkish defense sector organization in November 2024 to deliver two C++-malware families tracked as WmRAT and MiyaRAT. "The attack chain used alternate data streams in a RAR archive to deliver a shortcut (LNK) file that created a scheduled task on the target machine to pull down further payloads," Proofpoint

5 Practical Techniques for Effective Cyber Threat Hunting

17 December 2024
Addressing cyber threats before they have a chance to strike or inflict serious damage is by far the best security approach any company can embrace. Achieving this takes a lot of research and proactive threat hunting. The problem here is that it is easy to get stuck in endless arrays of data and end up with no relevant intel.  To avoid this, use these five battle-tested techniques that are

58,000 individuals’ data exposed after Bitcoin ATM operator hack

17 December 2024
A United States Bitcoin ATM operator, Byte Federal, recently disclosed a cyber incident. 

Hackers Exploit Webview2 to Deploy CoinLurker Malware and Evade Security Detection

17 December 2024
Bogus software update lures are being used by threat actors to deliver a new stealer malware called CoinLurker. "Written in Go, CoinLurker employs cutting-edge obfuscation and anti-analysis techniques, making it a highly effective tool in modern cyber attacks," Morphisec researcher Nadav Lorber said in a technical report published Monday. The attacks make use of fake update alerts that employ

The Mask APT Resurfaces with Sophisticated Multi-Platform Malware Arsenal

17 December 2024
A little-known cyber espionage actor known as The Mask has been linked to a new set of attacks targeting an unnamed organization in Latin America twice in 2019 and 2022. "The Mask APT is a legendary threat actor that has been performing highly sophisticated attacks since at least 2007," Kaspersky researchers Georgy Kucherin and Marc Rivero said in an analysis published last week. "Their targets

CISA and FBI Raise Alerts on Exploited Flaws and Expanding HiatusRAT Campaign

17 December 2024
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added two security flaws to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation in the wild. The list of flaws is below - CVE-2024-20767 (CVSS score: 7.4) - Adobe ColdFusion contains an improper access control vulnerability that could allow an attacker to access or modify restricted

27 DDoS-for-hire operations shut down by law enforcement

17 December 2024
Law enforcement agencies across 15 countries have shut down 27 DDoS-for-hire operations. 

DeceptionAds Delivers 1M+ Daily Impressions via 3,000 Sites, Fake CAPTCHA Pages

16 December 2024
Cybersecurity researchers have shed light on a previously undocumented aspect associated with ClickFix-style attacks that hinge on taking advantage of a single ad network service as part of a malvertising-driven information stealer campaign dubbed DeceptionAds. "Entirely reliant on a single ad network for propagation, this campaign showcases the core mechanisms of malvertising — delivering over

5 Cybersecurity trends in 2024

16 December 2024
2024 has seen a number of cybersecurity incidents, including high-profile cyberattacks and rapidly-developing artificial intelligence (AI).

NoviSpy Spyware Installed on Journalist's Phone After Unlocking It With Cellebrite Tool

16 December 2024
A Serbian journalist had his phone first unlocked by a Cellebrite tool and subsequently compromised by a previously undocumented spyware codenamed NoviSpy, according to a new report published by Amnesty International. "NoviSpy allows for capturing sensitive personal data from a target's phone after infection and provides the ability to turn on the phone's microphone or camera remotely," the

⚡ THN Weekly Recap: Top Cybersecurity Threats, Tools and Tips

16 December 2024
This past week has been packed with unsettling developments in the world of cybersecurity. From silent but serious attacks on popular business tools to unexpected flaws lurking in everyday devices, there’s a lot that might have flown under your radar. Attackers are adapting old tricks, uncovering new ones, and targeting systems both large and small. Meanwhile, law enforcement has scored wins

Data Governance in DevOps: Ensuring Compliance in the AI Era

16 December 2024
With the evolution of modern software development, CI/CD pipeline governance has emerged as a critical factor in maintaining both agility and compliance. As we enter the age of artificial intelligence (AI), the importance of robust pipeline governance has only intensified. With that said, we’ll explore the concept of CI/CD pipeline governance and why it's vital, especially as AI becomes

New Investment Scam Leverages AI, Social Media Ads to Target Victims Worldwide

16 December 2024
Cybersecurity researchers are calling attention to a new kind of investment scam that leverages a combination of social media malvertising, company-branded posts, and artificial intelligence (AI) powered video testimonials featuring famous personalities, ultimately leading to financial and data loss. "The main goal of the fraudsters is to lead victims to phishing websites and forms that harvest

Security experts respond to Krispy Kreme cyber attack

16 December 2024
A cybersecurity incident against Krispy Kreme disrupted its operations, and security leaders are sharing their insights. 

New Glutton Malware Exploits Popular PHP Frameworks Like Laravel and ThinkPHP

16 December 2024
Cybersecurity researchers have discovered a new PHP-based backdoor called Glutton that has been put to use in cyber attacks targeting China, the United States, Cambodia, Pakistan, and South Africa. QiAnXin XLab, which discovered the malicious activity in late April 2024, attributed the previously unknown malware with moderate confidence to the prolific Chinese nation-state group tracked Winnti (

Ukrainian Minors Recruited for Cyber Ops and Reconnaissance in Russian Airstrikes

16 December 2024
The Security Service of Ukraine (SBU or SSU) has exposed a novel espionage campaign suspected to be orchestrated by Russia's Federal Security Service (FSB) that involves recruiting Ukrainian minors for criminal activities under the guise of "quest games." Law enforcement officials said that it detained two FSB agent groups following a special operation in Kharkiv. These groups, per the agency,

Germany Disrupts BADBOX Malware on 30,000 Devices Using Sinkhole Action

14 December 2024
Germany's Federal Office of Information Security (BSI) has announced that it has disrupted a malware operation called BADBOX that came preloaded on at least 30,000 internet-connected devices sold across the country. In a statement published earlier this week, authorities said they severed the communications between the devices and their command-and-control (C2) servers by sinkholing the domains

Thai Officials Targeted in Yokai Backdoor Campaign Using DLL Side-Loading Techniques

14 December 2024
Thai government officials have emerged as the target of a new campaign that leverages a technique called DLL side-loading to deliver a previously undocumented backdoor dubbed Yokai. "The target of the threat actors were Thailand officials based on the nature of the lures," Nikhil Hegde, senior engineer for Netskope's Security Efficacy team, told The Hacker News. "The Yokai backdoor itself is not

390,000+ WordPress Credentials Stolen via Malicious GitHub Repository Hosting PoC Exploits

13 December 2024
A now-removed GitHub repository that advertised a WordPress tool to publish posts to the online content management system (CMS) is estimated to have enabled the exfiltration of over 390,000 credentials. The malicious activity is part of a broader attack campaign undertaken by a threat actor, dubbed MUT-1244 (where MUT refers to "mysterious unattributed threat") by Datadog Security Labs, that