Gangs Target Big Businesses in the U.S., Europe, and Asia The Brute Ratel pentesting tool with remote access features has been added to the…
General
Use-After-Free Vulnerability in Google Chrome WebGPU
A recent use-after-free vulnerability in Google Chrome’s WebGPU standard was found by Cisco Talos. Cross-platform web browser Google Chrome is built on the open-source…
Transparent Tribe’s Most Recent Campaign Targets The Educational Sector
At a Glance: Cisco Talos has been tracking a new malicious campaign operated by the Transparent Tribe APT group. This campaign involves the targeting…
3,000,000 New Android Malware Downloads From Google Play
Over 3,000,000 people downloaded a new Android malware family from the Google Play Store that discreetly subscribes users to premium services. Maxime Ingrao, an…
Ransomware and Vendor Breaches Predominate At The Halfway Point
The hundreds of significant health data breaches disclosed to federal regulators so far this year are dominated by ransomware incidents and breaches involving commercial…
Researchers Uncover New Variants of the ChromeLoader Browser Hijacking Malware
The information-stealing malware known as ChromeLoader has undergone recent iterations, showing how quickly its feature set has changed. ChromeLoader was discovered in January 2022…
The first victim is listed on the extortion website for the new Lilith ransomware
The ‘Lilith’ ransomware campaign has only begun, and it has already placed its first victim on a data leak website designed to facilitate double-extortion…
How To Close The Security Gap Caused By Ransomware
Organizations across all industries have noticed a dramatic shift in the threat landscape in recent years. All types of intrusions have expanded in quantity…
8 ‘Human Errors’ in Cyber Security That Happen Frequently and How to Avoid Them
According to the World Economic Forum, human error is to blame for 95% of cybersecurity issues. What if someone warned you that the modest…
Attackers Employ AiTM Phishing Sites As An Entry Point To Further Financial Fraud, From Cookie Theft To BEC
Even if a user has activated multifactor authentication, a large-scale phishing campaign using adversary-in-the-middle (AiTM) phishing sites managed to steal passwords, take over a…