targets

  • Threat actors are targeting Juniper routers with a custom backdoor in a campaign called code-named “J-magic,” attackers are exploiting a Magic Packet flaw. Lumen Technologies researchers reported that the J-magic campaign targets Juniper routers with a custom backdoor using a passive agent based on the cd00r variant (an open-source backdoor by fx). It activates upon detecting…

    Read More

  • A recent report by Stephen Kowski, Field CTO at SlashNext, highlights a concerning trend in credential harvesting: attackers The post Beyond DocuSign: Credential Harvesting Now Targets a Wider Range of Cloud Apps appeared first on Cybersecurity News.

    Read More

  • The research team at CYFIRMA has uncovered an alarming Android malware campaign attributed to the Indian advanced persistent The post Donot APT Group Targets Android Devices with Malicious Chat Apps appeared first on Cybersecurity News.

    Read More

  • Cybersecurity firm ESET uncovers PlushDaemon, a previously unknown APT group targeting South Korea, deploying a SlowStepper backdoor. This…

    Read More

  • Murdoc Botnet Uses Over 100 Distinct C2 Servers to Manage Infected DevicesA new variant of the Mirai malware is exploiting vulnerabilities in cameras and routers to infiltrate devices, download payloads and integrate them into an expanding botnet. Qualys tracked over 1,300 active internet protocol addresses linked to the Murdoc Botnet since its emergence in July…

    Read More

  • Murdoc Botnet Uses Over 100 Distinct C2 Servers to Manage Infected DevicesA new variant of the Mirai malware is exploiting vulnerabilities in cameras and routers to infiltrate devices, download payloads and integrate them into an expanding botnet. Qualys tracked over 1,300 active internet protocol addresses linked to the Murdoc Botnet since its emergence in July…

    Read More

  • Researchers warn of a campaign exploiting AVTECH IP cameras and Huawei HG532 routers to create a Mirai botnet variant called Murdoc Botnet. Murdoc Botnet is a new Mirai botnet variant that targets vulnerabilities in AVTECH IP cameras and Huawei HG532 routers, the Qualys Threat Research Unit reported. The botnet has been active since at least…

    Read More

  • President Trump took the first step toward rolling back protections for transgender people on Monday, signing an executive order that the federal government would only recognize two sexes, male and female.Why it matters: Trump made attacks on transgender individuals central to his 2024 campaign, and by issuing the executive order on his first day in…

    Read More

  • Outgoing U.S. President Joe Biden issued an Executive Order aimed at enhancing the nation’s cybersecurity, focused on defending digital infrastructure, securing essential services and capabilities within the digital realm, and developing the capacity to counter significant threats, including those from the People’s Republic of China. The move seeks to increase accountability for software and cloud…

    Read More

  • The Russian group Star Blizzard targets WhatsApp accounts in a new spear-phishing campaign, shifting tactics to avoid detection. In November 2024, Microsoft researchers observed the Russia-linked APT group Star Blizzard targeting WhatsApp accounts via spear-phishing, shifting tactics to avoid detection. The Star Blizzard group, aka “Callisto“, “Seaborgium“, “ColdRiver”, and “TA446,” targeted government officials, military personnel, journalists and…

    Read More

  • A new attack method dubbed transaction simulation spoofing has emerged as a significant threat to cryptocurrency users with its ability to let malicious actors exploit a key security feature in modern Web3 wallets.

    Read More

  • A new attack method dubbed transaction simulation spoofing has emerged as a significant threat to cryptocurrency users with its ability to let malicious actors exploit a key security feature in modern Web3 wallets.

    Read More

  • A new attack method dubbed transaction simulation spoofing has emerged as a significant threat to cryptocurrency users with its ability to let malicious actors exploit a key security feature in modern Web3 wallets.

    Read More

  • Threat Actor ‘Codefinger’ Targets Cloud EnvironmentsA ransomware group is targeting Amazon S3 buckets, exploiting the data stored there using AWS’s server-side encryption with customer keys and demanding a ransom in exchange for the encryption key needed to unlock the data. The group uses compromised or publicly exposed AWS account credentials.

    Read More

  • Threat Actor ‘Codefinger’ Targets Cloud EnvironmentsA ransomware group is targeting Amazon S3 buckets, exploiting the data stored there using AWS’s server-side encryption with customer keys and demanding a ransom in exchange for the encryption key needed to unlock the data. The group uses compromised or publicly exposed AWS account credentials.

    Read More

  • Threat Actor ‘Codefinger’ Targets Cloud EnvironmentsA ransomware group is targeting Amazon S3 buckets, exploiting the data stored there using AWS’s server-side encryption with customer keys and demanding a ransom in exchange for the encryption key needed to unlock the data. The group uses compromised or publicly exposed AWS account credentials.

    Read More

  • Recently, CrowdStrike uncovered a phishing campaign exploiting its trusted recruitment branding to distribute the XMRig cryptominer. Disguised as The post Recruitment Scam Targets Job Seekers with Fake CrowdStrike Branding appeared first on Cybersecurity News.

    Read More

  • Renowned for cyber espionage activities targeting critical sectors in the Middle East, OilRig, also known as APT34 or Helix Kitten operates with precision, exploiting vulnerabilities and employing advanced techniques to… The post CVE-2024-30088 Under Attack: OilRig Targets Windows Kernel Vulnerability appeared first on Cybersecurity News.

    Read More

  • Radware’s latest report unveils the emergence of the Holy League—a hacktivist formed in July 2024. This group is the result of a strategic merger between the pro-Russian High Society and… The post “Holy League” Hacktivist Group Emerges, Targets West appeared first on Cybersecurity News.

    Read More

  • TRAC Labs recently unveiled a new phishing kit, named WikiKit, which is targeting industries across automotive, manufacturing, medical, and more. This sophisticated attack employs unique techniques to evade detection and… The post WikiKit Phishing Kit Targets Major Industries with Evasive Techniques appeared first on Cybersecurity News.

    Read More