China and North Korea-aligned groups account for more than half of global attacks, and an increasing number of countries look to cyber to balance power in the region. Go to Source Author: Robert Lemos, Contributing Writer
Category Archives: Uncategorized
Researchers noted that they found several similar websites, two of which are still operating and require the same kind of behavior on behalf of the victim. Go to Source Author: Kristina Beek, Associate Editor, Dark Reading
A hacker exploiting the security flaw in the mobile provider’s network could have potentially located a call recipient with accuracy of up to 100 square meters. Go to Source Author: Kristina Beek, Associate Editor, Dark Reading
TenableOne now pulls in data from AWS, Microsoft, and competitors to provide a holistic security view of the organization’s attack surface. Go to Source Author: Jeffrey Schwartz
Regeneron’s acquisition of 23andMe raises significant privacy concerns as experts warn about the lack of comprehensive federal regulations governing the transfer of genetic information. Go to Source Author: Arielle Waldman
An employee inadvertently downloaded a malicious version of the legitimate RVTools utility, which launched an investigation into an attempted supply chain attack aimed at delivering the recently revived initial-access loader. Go to Source Author: Elizabeth Montalbano, Contributing Writer
A threat actor known as Hazy Hawk has been observed hijacking abandoned cloud resources of high-profile organizations, including Amazon S3 buckets and Microsoft Azure endpoints, by leveraging misconfigurations in the Domain Name System (DNS) records. The hijacked domains are then used to host URLs that direct users to scams and malware via traffic distribution systems […]
The threat group games IT help desks to gain entry into retailer networks, and signs show it has shifted its attention from the UK to US targets. Go to Source Author: Becky Bracken
An unknown threat actor has been attributed to creating several malicious Chrome Browser extensions since February 2024 that masquerade as seemingly benign utilities but incorporate covert functionality to exfiltrate data, receive commands, and execute arbitrary code. “The actor creates websites that masquerade as legitimate services, productivity tools, ad and media creation or analysis Go to […]
Since December 2023, the threat group has preyed on domains belonging to the US Centers for Disease Control and Prevention (CDC) and numerous other reputable organizations worldwide to redirect users to malicious sites. Go to Source Author: Jai Vijayan, Contributing Writer
