Microsoft has revealed that a financially motivated threat actor has been observed using a ransomware strain called INC for the first time to target the healthcare sector in the U.S. The tech giant’s threat intelligence team is tracking the activity under the name Vanilla Tempest (formerly DEV-0832). “Vanilla Tempest receives hand-offs from GootLoader infections by […]
Category Archives: Uncategorized
GitLab has released patches to address a critical flaw impacting Community Edition (CE) and Enterprise Edition (EE) that could result in an authentication bypass. The vulnerability is rooted in the ruby-saml library (CVE-2024-45409, CVSS score: 10.0), which could allow an attacker to log in as an arbitrary user within the vulnerable system. It was addressed […]
By accessing the MSSQL, threat actors gain admin-level access to the application, allowing them to automate their attacks. Go to Source Author: Dark Reading Staff
Thought to be Brazilian in origin, the remote access Trojan is the “perfect tool for a 21st-century James Bond.” Go to Source Author: Jai Vijayan, Contributing Writer
Criminal actors are finding their niche in utilizing QR phishing codes, otherwise known as “quishing,” to victimize unsuspecting tourists in Europe and beyond. Go to Source Author: Kristina Beek, Associate Editor, Dark Reading
Despite security updates to protect data, 45% of total enterprise instances of the cloud-based IT management platform leaked PII, internal system details, and active credentials over the past year. Go to Source Author: Elizabeth Montalbano, Contributing Writer
Cybersecurity researchers have uncovered a never-before-seen botnet comprising an army of small office/home office (SOHO) and IoT devices that are likely operated by a Chinese nation-state threat actor called Flax Typhoon (aka Ethereal Panda or RedJuliett). The sophisticated botnet, dubbed Raptor Train by Lumen’s Black Lotus Labs, is believed to have been operational since at […]
Ultimately, the goal of businesses and cyber insurers alike is to build more resilient IT environments to avoid cyberattacks and the ransom, downtime, and reputation hit that come along with them. Go to Source Author: David Bennett
A Chinese national has been indicted in the U.S. on charges of conducting a “multi-year” spear-phishing campaign to obtain unauthorized access to computer software and source code created by the National Aeronautics and Space Administration (NASA), research universities, and private companies. Song Wu, 39, has been charged with 14 counts of wire fraud and 14 […]
Can cyber defenders use the presence of infostealers as a canary in the coal mine to preempt ransomware attacks? Go to Source Author: Nate Nelson, Contributing Writer
