Proofpoint has identified a new malware loader known as Bumblebee. At least three different threat clusters tied to ransomware operations employ the loader. More details Bumblebee was most likely created by the Conti gang to replace the BazarLoader backdoor (aka…
Latest posts - Page 62
IoT devices plagued by unpatched vulnerability affecting DNS
Cybersecurity researchers have uncovered an unpatched flaw that could be a potential threat to IoT products. The flaw, originally reported in September 2021, plagues the Domain Name System (DNS) implementation of two well-known C libraries called uClibc and uClibc-ng that…
Google comes out with Developer preview Android 13 Privacy sandbox
Google has rolled out the first developer preview for the Android 13 privacy sandbox. You can get an “early look” into the SDK Runtime and Topics API to fortify users’ privacy online. “The Privacy Sandbox on Android Developer Preview program…
The REvil ransomware group is back: a new malware sample confirms it
Amid escalating tensions between Russia and the United States, the legendary REvil ransomware operation has resurfaced, armed with new infrastructure and a tweaked encryptor that allows for more targeted attacks. The REvil ransomware group was shut down in October when…
The Indian government has ordered businesses to notify CERT-In within six hours of discovering a security breach
CERT-In, India’s computer and emergency response organisation, released new guidelines on Thursday that service providers, intermediaries, data centres, and government institutions should disclose cybersecurity incidents, including data breaches, within six hours. “Any service provider, intermediary, data centre, body corporate, and…
Microsoft Azure flaw uncovers PostgreSQL databases to other customers
On Thursday, Microsoft said it had patched a pair of flaws with the Azure Database for PostgreSQL Flexible Server that can lead to unauthorised cross-account database access in a region. “By exploiting an elevated permissions bug in the Flexible Server…
Onyx ransomware destroys files instead of encrypting them
Instead of encrypting files larger than 2MB, a new Onyx ransomware operation is destroying them, preventing them from being decrypted even if a ransom is paid. MalwareHunterTeam, a security research firm, found Onyx, a new ransomware operation, last week. Onyx…
CISA has added seven new vulnerabilities to the list of defects that have been exploited in attacks
The US Cybersecurity and Infrastructure Security Agency (CISA) has included seven new vulnerabilities to its list of actively exploited security concerns, including Microsoft, Linux, and Jenkins vulnerabilities. The ‘Known Exploited Vulnerabilities Catalog’ is a list of vulnerabilities that have been…
RedLine Stealer infecting computers as part of New Rig Exploit Kit campaign
Attackers are planting RedLine Stealer trojan using an exploit kit. The attackers are taking advantage of an Internet Explorer flaw which was fixed by Microsoft last year. “When executed, RedLine Stealer performs recon against the target system (including username, hardware,…
The top exploited vulnerabilities in 2021 have been revealed by cybersecurity firms
Cybersecurity authorities around the world have released a list of the top 15 vulnerabilities regularly exploited by threat actors in 2021, in collaboration with the NSA and the FBI. In a joint alert, the cybersecurity authorities recommended enterprises to patch…