The infamous cryptojacking group known as TeamTNT appears to be readying for a new large-scale campaign targeting cloud-native environments for mining cryptocurrencies and renting out breached servers to third-parties. “The group is currently targeting exposed Docker daemons to deploy Sliver malware, a cyber worm, and cryptominers, using compromised servers and Docker Hub as the infrastructure […]
Category Archives: Uncategorized
Four members of the now-defunct REvil ransomware operation have been sentenced to several years in prison in Russia, marking one of the rare instances where cybercriminals from the country have been convicted of hacking and money laundering charges. Russian news publication Kommersant reported that a court in St. Petersburg found Artem Zaets, Alexei Malozemov, Daniil […]
The Computer Emergency Response Team of Ukraine (CERT-UA) has detailed a new malicious email campaign targeting government agencies, enterprises, and military entities. “The messages exploit the appeal of integrating popular services like Amazon or Microsoft and implementing a zero-trust architecture,” CERT-UA said. “These emails contain attachments in the form of Remote Desktop Protocol (‘.rdp’ Go […]
The networking company found liable for illegally gathering user data for targeted advertising by the Irish Data Protection Commission. Go to Source Author: Dark Reading Staff
Kremlin intelligence carried out a wide-scale phishing campaign in contrast to its usual, more targeted operations. Go to Source Author: Nate Nelson, Contributing Writer
Eight months after the breach occurred, Change Healthcare has finally sent out millions of notices of compromised data to affected individuals. Go to Source Author: Kristina Beek, Associate Editor, Dark Reading
Cybersecurity is mission-driven, meaningful work that coincides with the service branches’ goals to protect, defend, and create a safer world. Go to Source Author: Ryan Williams Sr.
A security flaw impacting the Wi-Fi Test Suite could enable unauthenticated local attackers to execute arbitrary code with elevated privileges. The CERT Coordination Center (CERT/CC) said the vulnerability, tracked as CVE-2024-41992, said the susceptible code from the Wi-Fi Alliance has been found deployed on Arcadyan FMIMG51AX000J routers. “This flaw allows an unauthenticated local attacker to […]
Vulnhuntr is a Python static code analyzer using Claude AI to find and explain complex, multistep vulnerabilities. Go to Source Author:
Renewable energy firms deal with a large cyberattack surface area, given the distributed nature of power generation and more pervasive connectivity. Go to Source Author: Robert Lemos, Contributing Writer
