Authorities Provided Rare Insight on Information Sharing to Protect US Networks From Malicious Hackers
The officials revealed that collaboration between the Cybersecurity and Infrastructure Security Agency (CISA) and the U.S. Cyber Command helped to prevent harmful cyberattacks. At the 2023 RSA Conference, officials from…
Experts From Infoblox Identified Decoy Dog, a Threat Actor that Was Active the Whole Year
A strong possibility arises to spot emerging cybercriminal techniques by analyzing DNS inquiries. Security experts Infobloxwas found a new bundle of business malware called “Decoy Dog” after conducting another examination…
Hackers can conceal dangerous apps in the Google Cloud Platform by using “Ghost tokens”
Even seasoned cybersecurity specialists can become confused by the “GhostToken” vulnerability’s abuse. Information on a newly resolved zero-day vulnerability in the Google Cloud Platform (GCP) has been made public by…
DoNot APT Carries Android Malware Through the Messengers
A recent attack campaign has surfaced in India, which is designed to target individuals through popular messaging apps such as WhatsApp. The attack leverages two types of malware to contaminate…
Trigona Ransomware Exploits Poorly Configured Microsoft SQL Servers
The hackers gain access through brute-force or dictionary attacks. They take advantage over servers that are either exposed to the internet or have poor security measures. The Trigona ransomware group,…
Learning From Past Cyber Attacks Can Enhance Companies Cyber Security
Deepwatch stresses analyzing previous cyber attacks to enhance an organization’s defense strategies. There’s been an increase in ransomware attacks where cybercriminals demand larger ransoms and threaten to expose victims publicly.…
Users Lose $170,000 Due to Trust Wallet’s Security Flaw
The WebAssembly module (WASM) of the browser extension included a security flaw that led to a loss of $170,000. Based on the report provided by Trust Wallet’s developers, wallet users…
New Surge in EvilExtractor Malware Detected in Europe and the United States
Researchers have noticed an increase in assaults disseminating the EvilExtractor data theft program, which is used in Europe and the US to steal consumers’ personal data. Seven attack modules, including…
Supply Chain Attack Targets Critical Infrastructure, Including 3CX Breach
Based on the Symantec’s Threat Hunter Team report, the X_Trader software supply chain attack that led to the 3CX hack last month has reportedly infiltrated a number of important infrastructure…
Cybercriminals Breach Illinois State Court Network and Boast Full Access
Everest asserted full authority over the network and said antivirus security wasn’t in place in an announcement posted on a Dark Web forum. The US District Court in Illinois has…