Latest Cybersecurity News and Articles


FTC orders Marriott to implement information security program

09 December 2024
The FTC will require Marriott and its subsidiary Starwood Hotels & Resorts to implement an information security program following three data breaches.

⚡ THN Recap: Top Cybersecurity Threats, Tools and Tips (Dec 2 - 8)

09 December 2024
This week’s cyber world is like a big spy movie. Hackers are breaking into other hackers’ setups, sneaky malware is hiding in popular software, and AI-powered scams are tricking even the smartest of us. On the other side, the good guys are busting secret online markets and kicking out shady chat rooms, while big companies rush to fix new security holes before attackers can jump in. Want to

Researchers Uncover Prompt Injection Vulnerabilities in DeepSeek and Claude AI

09 December 2024
Details have emerged about a now-patched security flaw in the DeepSeek artificial intelligence (AI) chatbot that, if successfully exploited, could permit a bad actor to take control of a victim's account by means of a prompt injection attack. Security researcher Johann Rehberger, who has chronicled many a prompt injection attack targeting various AI tools, found that providing the input "Print

Seven Bolt-Ons to Make Your Entra ID More Secure for Critical Sessions

09 December 2024
Identity security is all the rage right now, and rightfully so. Securing identities that access an organization’s resources is a sound security model. But IDs have their limits, and there are many use cases when a business should add other layers of security to a strong identity. And this is what we at SSH Communications Security want to talk about today. Let’s look at seven ways to add

Socks5Systemz Botnet Powers Illegal Proxy Service with 85,000+ Hacked Devices

09 December 2024
A malicious botnet called Socks5Systemz is powering a proxy service called PROXY.AM, according to new findings from Bitsight. "Proxy malware and services enable other types of criminal activity adding uncontrolled layers of anonymity to the threat actors, so they can perform all kinds of malicious activity using chains of victim systems," the company's security research team said in an analysis

Experts say Chinese hacking campaign underscores value of mobile data

09 December 2024
The recent Chinese hacking campaign against telecommunications companies underscores value of mobile data. 

Ultralytics AI Library Compromised: Cryptocurrency Miner Found in PyPI Versions

07 December 2024
In yet another software supply chain attack, it has come to light that two versions of a popular Python artificial intelligence (AI) library named ultralytics were compromised to deliver a cryptocurrency miner. The versions, 8.3.41 and 8.3.42, have since been removed from the Python Package Index (PyPI) repository. A subsequently released version has introduced a security fix that "ensures

Learn How Experts Secure Privileged Accounts—Proven PAS Strategies Webinar

07 December 2024
Cybercriminals know that privileged accounts are the keys to your kingdom. One compromised account can lead to stolen data, disrupted operations, and massive business losses. Even top organizations struggle to secure privileged accounts. Why? Traditional Privileged Access Management (PAM) solutions often fall short, leaving: Blind spots that limit full visibility. Complex deployment processes.

Hackers Using Fake Video Conferencing Apps to Steal Web3 Professionals' Data

07 December 2024
Cybersecurity researchers have warned of a new scam campaign that leverages fake video conferencing apps to deliver an information stealer called Realst targeting people working in Web3 under the guise of fake business meetings. "The threat actors behind the malware have set up fake companies using AI to make them increase legitimacy," Cado Security researcher Tara Gould said. "The company

Romania Cancels Presidential Election Results After Alleged Russian Meddling on TikTok

07 December 2024
In a historic decision, Romania's constitutional court has annulled the result of the first round of voting in the presidential election amid allegations of Russian interference. As a result, the second round vote, which was scheduled for December 8, 2024, will no longer take place. Călin Georgescu, who won the first round, denounced the verdict as an "officialized coup" and an attack on

U.S. Copyright Office states common AI research does not violate DMCA

06 December 2024
The U.S. Copyright Office has clarified legal rules for trustworthiness research and red teaming of artificial intelligence. 

FSB Uses Trojan App to Monitor Russian Programmer Accused of Supporting Ukraine

06 December 2024
A Russian programmer accused of donating money to Ukraine had his Android device secretly implanted with spyware by the Federal Security Service (FSB) after he was detained earlier this year. The findings come as part of a collaborative investigation by First Department and the University of Toronto's Citizen Lab. "The spyware placed on his device allows the operator to track a target device's

Researchers Uncover Flaws in Popular Open-Source Machine Learning Frameworks

06 December 2024
Cybersecurity researchers have disclosed multiple security flaws impacting open-source machine learning (ML) tools and frameworks such as MLflow, H2O, PyTorch, and MLeap that could pave the way for code execution. The vulnerabilities, discovered by JFrog, are part of a broader collection of 22 security shortcomings the supply chain security company first disclosed last month. Unlike the first

Conquering the Complexities of Modern BCDR

06 December 2024
The modern business landscape is thrilling yet daunting. Rapidly evolving technology, persistent cyberthreats and escalating operational complexities make data protection and seamless business continuity challenging for businesses of all sizes. Your organization needs robust security measures that go beyond traditional backup solutions to address the intricacies of today’s complex IT ecosystems.

A new report shows QR code phishing is on the rise

06 December 2024
QR code phishing is on the rise, according to a new report. 

More_eggs MaaS Expands Operations with RevC2 Backdoor and Venom Loader

06 December 2024
The threat actors behind the More_eggs malware have been linked to two new malware families, indicating an expansion of its malware-as-a-service (MaaS) operation. This includes a novel information-stealing backdoor called RevC2 and a loader codenamed Venom Loader, both of which are deployed using VenomLNK, a staple tool that serves as an initial access vector for the deployment of follow-on

Hackers Leveraging Cloudflare Tunnels, DNS Fast-Flux to Hide GammaDrop Malware

06 December 2024
The threat actor known as Gamaredon has been observed leveraging Cloudflare Tunnels as a tactic to conceal its staging infrastructure hosting a malware called GammaDrop. The activity is part of an ongoing spear-phishing campaign targeting Ukrainian entities since at least early 2024 that's designed to drop the Visual Basic Script malware, Recorded Future's Insikt Group said in a new analysis.

Phishing attacks rose by more than 600% in the buildup to Black Friday

06 December 2024
In the week leading up to Black Friday and Cyber Monday, there was a 692% increase in phishing attacks. 

Warning issued for 10-year-old vulnerability, security leaders discuss

05 December 2024
A decade-old security flaw is being actively exploited, according to a warning issued by Cisco.

This $3,000 Android Trojan Targeting Banks and Cryptocurrency Exchanges

05 December 2024
As many as 77 banking institutions, cryptocurrency exchanges, and national organizations have become the target of a newly discovered Android remote access trojan (RAT) called DroidBot. "DroidBot is a modern RAT that combines hidden VNC and overlay attack techniques with spyware-like capabilities, such as keylogging and user interface monitoring," Cleafy researchers Simone Mattia, Alessandro