Latest Cybersecurity News and Articles


NIST Releases New Draft of Digital Identity Proofing Guidelines

02 September 2024
The new draft of NIST's digital identity proofing guidelines includes updates to accommodate passkeys and mobile driver's licenses, as well as options for identification without using biometrics like facial recognition.

CISA Launches Cyber Incident Reporting Portal To Streamline Breach Disclosure

02 September 2024
The CISA has launched a cyber incident reporting portal to make breach disclosure easier. It allows organizations to report cyberattacks, vulnerabilities, and data breaches voluntarily.

North Korean Cyberattacks Persist: Developers Targeted via npm Packages

02 September 2024
The campaign, known as "Contagious Interview," tricks developers into downloading fake npm packages or installers. The attackers deploy a Python payload named InvisibleFerret to steal data from cryptocurrency wallets.

Cyber Threats That Shaped the First Half of 2024

02 September 2024
According to a report by Critical Start Cyber Research Unit, the manufacturing industry was the top target for cyber threats in H1 2024, professional services saw a 15% increase in attacks, and healthcare experienced a 180% surge in incidents.

OceanLotus APT Group Targeting Vietnamese Human Rights Defenders

02 September 2024
The attackers use spear-phishing lures and watering hole campaigns to infiltrate networks and collect sensitive data. Huntress identified four compromised hosts in recent attacks, linking them to Cobalt Strike Beacons and encrypted DLL payloads.

Webinar: Learn to Boost Cybersecurity with AI-Powered Vulnerability Management

02 September 2024
The world of cybersecurity is in a constant state of flux. New vulnerabilities emerge daily, and attackers are becoming more sophisticated. In this high-stakes game, security leaders need every advantage they can get. That's where Artificial Intelligence (AI) comes in. AI isn't just a buzzword; it's a game-changer for vulnerability management. AI is poised to revolutionize vulnerability

State-Backed Attackers and Commercial Surveillance Vendors Repeatedly Use the Same Exploits

02 September 2024
Russian hackers exploited vulnerabilities in Safari and Chrome to launch cyberattacks from November 2023 to July 2024. They used a watering hole attack on Mongolian government websites to infect mobile users with malware, stealing information.

Next-Generation Attacks, Same Targets - How to Protect Your Users' Identities

02 September 2024
The FBI and CISA Issue Joint Advisory on New Threats and How to Stop Ransomware Note: on August 29, the FBI and CISA issued a joint advisory as part of their ongoing #StopRansomware effort to help organizations protect against ransomware. The latest advisory, AA24-242A, describes a new cybercriminal group and its attack methods. It also details three important actions to take today to mitigate

Software supply chain experiences almost 1 attack every 2 days

02 September 2024
In 2024, the software supply chain has faced attacks at a minimum rate of one every two days. 

Malicious npm Packages Mimicking 'noblox.js' Compromise Roblox Developers’ Systems

01 September 2024
Roblox developers are the target of a persistent campaign that seeks to compromise systems through bogus npm packages, once again underscoring how threat actors continue to exploit the trust in the open-source ecosystem to deliver malware. "By mimicking the popular 'noblox.js' library, attackers have published dozens of packages designed to steal sensitive data and compromise systems," Checkmarx

North Korean Hackers Deploy FudModule Rootkit via Chrome Zero-Day Exploit

31 August 2024
A recently patched security flaw in Google Chrome and other Chromium web browsers was exploited as a zero-day by North Korean actors in a campaign designed to deliver the FudModule rootkit. The development is indicative of the persistent efforts made by the nation-state adversary, which had made a habit of incorporating rafts of Windows zero-day exploits into its arsenal in recent months.

Rocinante: The Trojan Horse That Wanted to Fly

31 August 2024
Once installed, the Rocinante malware prompts the victim to grant Accessibility Services and displays phishing screens tailored to different banks to steal personal information.

New Snake Keylogger Variant Slithers Into Phishing Campaigns

31 August 2024
The attack starts with a phishing email disguised as a fund transfer notification, with an attached Excel file named “swift copy.xls” that triggers the deployment of Snake Keylogger on the victim's computer upon opening.

FBI: RansomHub Ransomware Breached 210 Victims Since February 2024

31 August 2024
The ransomware operation focuses on data theft extortion rather than encrypting files, with victims facing the threat of stolen data being leaked or sold if negotiations fail.

Operation DevilTiger: APT-Q-12’s Shadowy Tactics and Zero-Day Exploits Unveiled

31 August 2024
The QiAnXin Threat Intelligence Center has revealed the details of "Operation DevilTiger," a cyber espionage campaign carried out by the elusive APT-Q-12 group, also known as "Pseudo Hunter."

Suspected Espionage Campaign Delivers New Voldemort Malware

31 August 2024
The campaign, which targeted organizations worldwide, involved impersonating tax authorities from various countries and utilizing Google Sheets for command and control (C2).

Godzilla Fileless Backdoors Targeting Atlassian Confluence

31 August 2024
The Godzilla fileless backdoor relies on a complex series of actions, such as cryptographic operations, class loading, and dynamic injection, to establish unauthorized access.

US Offers $2.5 Million Reward for Hacker Linked to Angler Exploit Kit

30 August 2024
The U.S. Department of State and the Secret Service are offering a reward of $2.5 million for information leading to the capture of Belarusian cybercriminal Volodymyr Kadariya, who is linked to the Angler Exploit Kit.

Cybercriminals Capitalize on Travel Industry’s Peak Season

30 August 2024
Cequence Security found that cyberattacks against the travel industry surge during holidays, with 91% of severe vulnerabilities in the top 10 travel and hospitality sites enabling man-in-the-middle attacks.

CISA and partners host security exercise to improve election security

30 August 2024
CISA and partners host security exercise to improve election security, called Tabletop the Vote.