LATEST

Belarus-Linked Ghostwriter Uses Macropack-Obfuscated Excel Macros to Deploy Malware

Belarus-Linked Ghostwriter Uses Macropack-Obfuscated Excel Macros to Deploy Malware

CYBER ATTACKZerowl

It has been determined that the threat cluster is an extension of an ongoing campaign carried out by a threat actor with ties to Belarus. An obfuscated macro is executed when a malicious Exce

APT-C-60 Hackers Exploit StatCounter and Bitbucket in SpyGlace Malware Campaign

APT-C-60 Hackers Exploit StatCounter and Bitbucket in SpyGlace Malware Campaign

CYBER ATTACKZerowl

According to JPCERT/CC, APT-C-60 delivered the SpyGlace backdoor using a lure with a job application theme. The attack made use of trustworthy services like Bitbucket, Google Drive, and StatC

AndroxGh0st Malware Integrates Mozi Botnet to Target IoT and Cloud Services

AndroxGh0st Malware Integrates Mozi Botnet to Target IoT and Cloud Services

CYBER ATTACKZerowl

The Python-based cloud attack tool AndroxGh0st is well-known for specifically targeting Laravel applications. It has previously taken advantage of vulnerabilities in PHPUnit, the Laravel Fram

⚡ THN Weekly Recap: Top Cybersecurity Threats, Tools and Tips [6 Jan]

⚡ THN Weekly Recap: Top Cybersecurity Threats, Tools and Tips [6 Jan]

CYBER ATTACKZerowl

Numerous Google Chrome extensions have been found to steal private information. Apple consents to pay $95 million to resolve a protracted class action lawsuit in the United States. A proof-of

⚡ THN Weekly Recap: Top Cybersecurity Threats, Tools and Tips

⚡ THN Weekly Recap: Top Cybersecurity Threats, Tools and Tips

CYBER ATTACKZerowl

There have been many disturbing developments in the field of cybersecurity over the past week. Cybercriminals have been actively taking advantage of a serious flaw in Cleo's file transfer sof

⚡ THN Recap: Top Cybersecurity Threats, Tools and Tips (Dec 2 - 8)

⚡ THN Recap: Top Cybersecurity Threats, Tools and Tips (Dec 2 - 8)

CYBER ATTACKZerowl

Even the most intelligent of us are being duped by AI-powered scams, sneaky malware is hiding in well-known software, and hackers are breaking into the setups of other hackers. On the other h

Webinar: How Attackers Exploit Cloud Misconfigurations Across AWS, AI Models, and Kubernetes

Webinar: How Attackers Exploit Cloud Misconfigurations Across AWS, AI Models, and Kubernetes

The Palo Alto Networks Cortex Cloud team will take you through three recent investigations in a technical deep dive next week. Because these threats appear to be typical activity, standard se

Why Data Security and Privacy Need to Start in Code

Why Data Security and Privacy Need to Start in Code

The number of applications and the rate of change within those applications are growing at an accelerated rate for businesses. Teams in charge of security and privacy are under a lot of press

WatchGuard Warns of Active Exploitation of Critical Fireware OS VPN Vulnerability

WatchGuard Warns of Active Exploitation of Critical Fireware OS VPN Vulnerability

A serious security vulnerability in Fireware OS has been fixed by WatchGuard. According to the company, the vulnerability has been used in actual attacks. The vulnerability has been character

U.S. DoJ Seizes Fraud Domain Behind $14.6 Million Bank Account Takeover Scheme

U.S. DoJ Seizes Fraud Domain Behind $14.6 Million Bank Account Takeover Scheme

A website used to support a bank account takeover scheme was taken over by the U.S. Justice Department. Illegally obtained bank login credentials were hosted and manipulated using the domain

Top 5 this week

Page 197 of 202