BlueNoroff introduces new methods bypassing MoTW

BlueNoroff group is a financially motivated threat actor eager to profit from its cyberattack capabilities. Kaspersky researchers have published technical details of how this notorious group steals cryptocurrency before. Kaspersky continue to track the group’s activities and this October they Read More …

Hackers stole data from multiple electric utilities in recent ransomware attack

Hackers stole data belonging to multiple electric utilities in an October ransomware attack on a US government contractor that handles critical infrastructure projects across the country, according to a memo describing the hack obtained by CNN. Federal officials have closely Read More …

AI cyber attacks are a ‘critical threat’. This is how NATO is countering them

Artificial intelligence (AI) is playing a massive role in cyber attacks and is proving both a “double-edged sword” and a “huge challenge,” according to NATO. “Artificial intelligence allows defenders to scan networks more automatically, and fend off attacks rather than Read More …

Louisiana: Lake Charles Memorial Health has possible cybersecurity incident

Some Lake Charles health care system patients may have had their information involved in a cybersecurity incident. The Lake Charles Memorial Health System on Friday mailed letters to some of its “patients whose information may have been involved in a Read More …

IcedID Botnet Distributors Abuse Google PPC to Distribute Malware

After closely tracking the activities of the IcedID botnet, Trend Micro researchers have discovered some significant changes in its distribution methods. Since December 2022, Trend Micro observed the abuse of Google pay per click (PPC) ads to distribute IcedID via Read More …

Patch now: Serious Linux kernel security hole uncovered

Just what every Linux system administrator wants just before the holidays: A serious Linux kernel security bug. The Zero Day Initiative (ZDI), a zero-day security research firm, announced a new Linux kernel security bug. This hole allows authenticated remote users Read More …

LastPass admits attackers have a copy of customers’ password vaults

Password locker LastPass has warned customers that the August 2022 attack on its systems saw unknown parties copy encrypted files that contains the passwords to their accounts. In a December 22nd update to its advice about the incident, LastPass brings Read More …

Twitter Probed in EU for Pre-Musk Data Leak of 5.4 Million Users

Ireland’s Data Protection Commission said Friday it decided to start a probe over reports that one or more datasets of users’ personal information “had been made available on the internet.” “These datasets were reported to contain personal data relating to Read More …

Crooks copy source code from Okta’s GitHub repository

Intruders copied source code belonging to Okta after breaching the identity management company’s GitHub repositories. Okta was alerted by Microsoft-owned GitHub earlier this month of “suspicious access” to its code repositories and determined that miscreants copied code associated with the Read More …