Latest Cybersecurity News and Articles


HelloKitty Ransomware Rebrands, Releases CD Projekt and Cisco Data

22 April 2024
An operator of the HelloKitty ransomware operation announced they changed the name to 'HelloGookie,' releasing passwords for previously leaked CD Projekt source code, Cisco network information, and decryption keys from old attacks.

Jury Dishes Out Guilty Verdict in Mango Markets Fraud Case

22 April 2024
A New York federal jury found a hacker guilty of all charges that he masterminded and carried out a scheme to fraudulently obtain $110 million from cryptocurrency exchange Mango Markets and investors.

Microsoft Warns: North Korean Hackers Turn to AI-Fueled Cyber Espionage

22 April 2024
Microsoft has revealed that North Korea-linked state-sponsored cyber actors has begun to use artificial intelligence (AI) to make its operations more effective and efficient. "They are learning to use tools powered by AI large language models (LLM) to make their operations more efficient and effective," the tech giant said in its latest report on East Asia hacking groups. The company

New RedLine Stealer Variant Disguised as Game Cheats Using Lua Bytecode for Stealth

21 April 2024
A new information stealer has been found leveraging Lua bytecode for added stealth and sophistication, findings from McAfee Labs reveal. The cybersecurity firm has assessed it to be a variant of a known malware called RedLine Stealer owing to the fact that the command-and-control (C2) server IP address has been previously identified as associated with the malware. RedLine Stealer, 

CrushFTP Warns Users to Patch Exploited Zero-Day “Immediately”

20 April 2024
As the company also explains in a public security advisory published on Friday, this zero-day bug enables unauthenticated attackers to escape the user's virtual file system (VFS) and download system files.

Evil XDR: Researcher Turns Palo Alto Software Into Perfect Malware

20 April 2024
In a briefing at Black Hat Asia, Shmuel Cohen, security researcher at SafeBreach, described how he not only reverse-engineered and cracked into the company's signature Cortex product but also weaponized it to deploy a reverse shell and ransomware.

Palo Alto Networks Discloses More Details on Critical PAN-OS Flaw Under Attack

20 April 2024
Palo Alto Networks has shared more details of a critical security flaw impacting PAN-OS that has come under active exploitation in the wild by malicious actors. The company described the vulnerability, tracked as CVE-2024-3400 (CVSS score: 10.0), as "intricate" and a combination of two bugs in versions PAN-OS 10.2, PAN-OS 11.0, and PAN-OS 11.1 of the software. "In

Hackers Target Middle East Governments with Evasive "CR4T" Backdoor

20 April 2024
The starting point of the attack is a dropper, which comes in two variants -- a regular dropper that's either implemented as an executable or a DLL file and a tampered installer file for a legitimate tool named Total Commander.

Critical Update: CrushFTP Zero-Day Flaw Exploited in Targeted Attacks

20 April 2024
Users of the CrushFTP enterprise file transfer software are being urged to update to the latest version following the discovery of a security flaw that has come under targeted exploitation in the wild. "CrushFTP v11 versions below 11.1 have a vulnerability where users can escape their VFS and download system files," CrushFTP said in an advisory released Friday.

66% of IT leaders doubt the government can defend against cyberwarfare

19 April 2024
In a recent report, two-thirds of IT leaders express a lack of confidence in the United States government's ability to defend against cyberwarfare.

Fake Cheat Lures Gamers Into Spreading Infostealer Malware

19 April 2024
A new info-stealing malware linked to Redline poses as a game cheat called 'Cheat Lab,' promising downloaders a free copy if they convince their friends to install it too.

NSA Shares Best Practices for Secure AI Systems

19 April 2024
The guidance offers a wide range of best practices, including that organizations adopt a zero trust mindset, actively monitor the AI model’s behavior, and require the primary developer of the AI system to provide a threat model for their system.

Dark Web Sales Driving Major Rise in Credential Attacks

19 April 2024
A rise in infostealer malware attacks over the past three years has enabled cybercriminal groups to turn credential stealing into a major money-making business, paving the way for new entrants in the field and sophisticated hacking techniques.

CISA, FBI, and ODNI Release Guidance for Securing Election Infrastructure Against the Tactics of Foreign Malign Influence Operations

19 April 2024
The guidance document details the latest tactics employed in foreign malign influence operations to shape U.S. policies, decisions, and discourse and could be used to target America’s election infrastructure.

BlackTech Targets Tech, Research, and Gov Sectors New 'Deuterbear' Tool

19 April 2024
Technology, research, and government sectors in the Asia-Pacific region have been targeted by a threat actor called BlackTech as part of a recent cyber attack wave. The intrusions pave the way for an updated version of modular backdoor dubbed Waterbear as well as its enhanced successor referred to as Deuterbear. "Waterbear is known for its complexity, as it

Report finds a near 20% increase in ransomware victims year-over-year

19 April 2024
The number of victims experiencing ransomware incidents has risen since Q1 of 2023, rising by nearly 20% by Q1 of 2024. 

Trust in Cyber Takes a Knock as CNI Budgets Flatline

19 April 2024
Trust in cybersecurity tools has become one of the biggest challenges facing critical national infrastructure (CNI) providers as sophisticated nation-state attacks proliferate, according to a new report from Bridewell.

CISA, FBI, Europol Say Akira Ransomware Raked in $42 Million From Over 250 Victims

19 April 2024
According to a joint advisory from the FBI, CISA, Europol's EC3, and the Netherlands' NCSC-NL, the Akira ransomware operation has breached the networks of over 250 organizations and raked in roughly $42 million in ransom payments.

Hacking the Floodgates: US Dams Face Growing Cyber Threats

19 April 2024
Could a hacker seize control of America's dams, unleashing floods and chaos across vulnerable communities? Cybersecurity analysts and leading lawmakers warn it's possible.

How Attackers Can Own a Business Without Touching the Endpoint

19 April 2024
Attackers are increasingly making use of “networkless” attack techniques targeting cloud apps and identities. Here’s how attackers can (and are) compromising organizations – without ever needing to touch the endpoint or conventional networked systems and services.  Before getting into the details of the attack techniques being used, let’s discuss why