Computer Security
CVE-2022-42475 Vulnerability: How to Stay Protected
In the ever-evolving cybersecurity landscape, staying informed about vulnerabilities and their potential impacts is crucial. One such vulnerability that has garnered significant attention is CVE-2022-42475. Here, we... Read more
Millions of Cox Modems Succumb to Remote Hacking via Vulnerabilities
Cox Communications, a major telecommunications company, recently addressed a series of vulnerabilities that could have allowed remote hackers to take control of millions of customer modems. These vulnerabilities were... Read more
31-Year-Old Sentenced to 10 Years for Laundering Email Scams Amounting to $4.5 Million
The U.S. Department of Justice (DoJ) has handed down a 10-year prison sentence to Malachi Mullings, a 31-year-old resident of Sandy Springs, Georgia. Mullings pleaded guilty to laundering over $4.5 million acquired... Read more
Durian Malware Linked to Kimsuky North Korean Threat Actor
The North Korean threat group known as Kimsuky has been observed using a new Golang-based malware called Durian in targeted cyber attacks against two South Korean cryptocurrency companies. According to security... Read more
Wpeeper Mobile Malware Targets Android Devices
Researchers in cybersecurity have identified new malware that targets Android devices. This malware, named Wpeeper, was found to use compromised WordPress websites to mask its true command-and-control servers, making... Read more
Muddling Meerkat APT Discovered Pulling DNS Tricks
A new cyber threat named Muddling Meerkat has been detected engaging in sophisticated activities involving the domain name system (DNS) since October 2019. This appears to be an attempt to evade security measures and... Read more
Large-Scale Credential Theft Campaign Targets Snowflake Cloud Storage
A new report from Mandiant has revealed that approximately 165 organizations have been affected by a large-scale campaign exploiting stolen customer credentials to target Snowflake cloud storage systems. The campaign... Read more
European Union Agency for Cybersecurity: Disruptive Cyberattacks Doubled in 2024, Most Linked to Russian-Backed Groups
Disruptive cyberattacks have surged in the European Union, with many linked to Russian-backed groups, according to the European Union Agency for Cybersecurity (ENISA). Juhan Lepassaar, head of ENISA, highlighted in an... Read more
Understanding EU ATM Malware: A Growing Cyber Threat
What is EU ATM Malware? EU ATM malware represents a sophisticated and evolving category of malicious software designed to target Automated Teller Machines (ATMs) in Europe. These malicious programs enable... Read more
CVE-2024-3661 Vulnerability Exploited in TunnelVision Attack
Researchers have described a technique called TunnelVision, which allows threat actors to monitor network traffic of victims by leveraging the same local network. This bypass method, referred to as "decloaking," has... Read more
Cuckoo Stealer Takes Aim at Mac Systems
Security researchers have detected a fresh information thief aimed at Apple macOS systems, designed to establish persistence on affected machines and operate as spyware. Known as Cuckoo by Kandji, this malware is a... Read more
Kaolin RAT Linked to North Korean Lazarus Group APT
The Lazarus Group, associated with North Korea, utilized familiar tactics involving fake job offers to distribute a new remote access trojan (RAT) called Kaolin RAT during attacks aimed at specific individuals in Asia... Read more
Ticketmaster’s Snowflake Platform Data Breach Impacts Millions
Ticketmaster, along with several other organizations, experienced a significant data breach due to a security incident at the cloud storage company Snowflake. This breach came to light when a well-known hacking group... Read more
The Potential Issues with EMP.dll File: What You Need to Know
Understanding DLL Files Dynamic Link Library (DLL) files are essential components of the Windows operating system. They contain code and data that a lot of programs can use at the same time. These files help programs... Read more
The 2024 US Election: Navigating the New Frontier of Potential AI-Driven Cyber Threats
As the 2024 US presidential election approaches, the potential for cyber threats looms larger than ever. The rise of artificial intelligence (AI) has added a new dimension to the cybersecurity landscape, posing... Read more
ROOTROT Malware Used by Chinese Threat Actor
The MITRE Corporation has provided additional information about a recent cyber attack, revealing that the earliest signs of intrusion date back to December 31, 2023. This attack, disclosed last month, targeted MITRE's... Read more
Google Reports Blocking Over 2.2 Million Malicious Apps on the Play Store
In late April 2024, Google announced that enhancements to its security processes prevented 2.28 million privacy-violating apps from being published on its Google Play store in 2023. The company attributed this success... Read more
Akira Ransomware Banks $42 Million in Ransom Payments Over a Single Year
Since early 2023, Akira ransomware has targeted more than 250 victims globally and collected over $42 million in ransom payments, according to CISA, the FBI, Europol, and the Netherlands’ National Cyber Security... Read more