cyber security
-
Iran's cyber espionage "muddy waters" are back, and the Middle East telecommunications industry has become a new hunting ground
The Iranian state-level cyber espionage organization "MuddyWater" has resurfaced and used a new command and control framework called "MuddyC2Go" to launch attacks targeting the telecommunications industries of Egypt, Sudan and Tanzania. Symantec Threat Hunter Team…
-
The Russian Matrix: Revealing the Operations of Wazawaka and its Cyber Extortion Gang
Cybersecurity researchers have revealed the inner workings of a ransomware operation led by Mikhail Pavlovich Matveev, a Russian citizen who was indicted by the U.S. government earlier this year on charges that he engaged in...
-
Crypto wallet Ledger supply chain vulnerability led to the theft of $600,000 in virtual assets
A supply chain attack on crypto hardware wallet manufacturer Ledger resulted in the theft of $600,000 in crypto assets. The attacker obtained Ledger's npm account through a phishing attack on a resigned employee, and uploaded a malicious version of the Connect Kit module. These malicious versions spread cryptocurrency-stealing malware to other applications that rely on the module, creating software supply chain vulnerabilities.
-
North Korean hacker group Lazarus Group launches new cyber attack operation
Recently, a global attack campaign launched by the notorious North Korea-linked cyber threat group "Lazarus Group" was disclosed. This operation was named "Operation Blacksmith" and was characterized by exploiting the Log4j vulnerability (CVE-2021-44228, also known as Log4Shell) to deploy a previously unknown remote access Trojan (RAT) on target systems.
-
The rise of ransomware as a service (RaaS) users face more severe threats
In the evolving world of cybersecurity, ransomware attacks have become a serious and widespread threat. Among the different forms of ransomware, a trend called Ransomware-as-a-Service (RaaS) is becoming increasingly prominent. This worrying development changes the cybercrime landscape, enabling individuals with limited technical capabilities to carry out destructive attacks.
-
WordPress 6.4.2 releases update to address high-risk remote code execution vulnerability
WordPress has released version 6.4.2, which contains a patch for a critical security vulnerability that could be exploited by threat actors to combine it with another vulnerability to execute arbitrary PHP code on vulnerable websites.
-
Data security: How does generative AI deal with security risks and challenges?
The development and application of AI are having a major impact on the scientific and technological field and may trigger a new productivity revolution. As a powerful technology, AI gives computer systems the ability to generate human language content.
-
Apache Ofbiz xml-RPC remote code execution vulnerability (CVE-2023-49070)
Apache OFBiz is an open source product for enterprise process automation. It includes framework components and business applications for ERP, CRM, e-commerce, supply chain management and manufacturing resource planning. There is a remote code execution vulnerability in Apache OFBiz before version 18.12.10. Because xml-RPC is no longer maintained, an authenticated attacker can use xml-RPC to conduct remote code execution exploits and control the server.
-
North Korean hackers stole $3 billion in cryptocurrency
According to reports, North Korean state-level hacker groups Kimsuky, Lazarus Group and Andariel have stolen approximately $3 billion worth of cryptocurrency in the past six years. The hackers primarily targeted cryptocurrency exchanges, but also targeted individual users and venture capital firms.
-
Agent Racoon malicious backdoor attacks organizations in the Middle East, Africa and other countries
"This malware family is written using the .NET framework and leverages the Domain Name Service (DNS) protocol to create...