Akira ransomware gang used an unsecured webcam to bypass EDRThe Akira ransomware gang used an unsecured webcam to exploit vulnerabilities in a victim's network.
Ransomware incidents reached record levels in 2024Ransomware incidents surged in 2024 with record levels of attacks and new variants posing greater threats.
Researchers Link CACTUS Ransomware Tactics to Former Black Basta AffiliatesAffiliates from the Black Basta ransomware group are transitioning to CACTUS, sharing malicious tools to maintain persistent control over infected systems.
Fresh warning issued over encryption-less ransomware as notorious threat group shifts tacticsBianLian ransomware gang has shifted from encryption-based attacks to data exfiltration-based extortion tactics, reflecting a broader trend in cybercrime.
New Qilin Ransomware Attack Uses VPN Credentials, Steals Chrome DataCredential harvesting linked with ransomware is a growing threat, raising concerns for cybersecurity protocols.
Hybrid cloud environments are under serious threat from hackers - here's what you need to knowStorm-0501 is a financially motivated cyber criminal group exploiting vulnerabilities in hybrid cloud environments, utilizing ransomware and credential theft.
Akira ransomware gang used an unsecured webcam to bypass EDRThe Akira ransomware gang used an unsecured webcam to exploit vulnerabilities in a victim's network.
Ransomware incidents reached record levels in 2024Ransomware incidents surged in 2024 with record levels of attacks and new variants posing greater threats.
Researchers Link CACTUS Ransomware Tactics to Former Black Basta AffiliatesAffiliates from the Black Basta ransomware group are transitioning to CACTUS, sharing malicious tools to maintain persistent control over infected systems.
Fresh warning issued over encryption-less ransomware as notorious threat group shifts tacticsBianLian ransomware gang has shifted from encryption-based attacks to data exfiltration-based extortion tactics, reflecting a broader trend in cybercrime.
New Qilin Ransomware Attack Uses VPN Credentials, Steals Chrome DataCredential harvesting linked with ransomware is a growing threat, raising concerns for cybersecurity protocols.
Hybrid cloud environments are under serious threat from hackers - here's what you need to knowStorm-0501 is a financially motivated cyber criminal group exploiting vulnerabilities in hybrid cloud environments, utilizing ransomware and credential theft.
Microsoft confirms customer emails were stolen during Midnight Blizzard breachMicrosoft warned customers of Russian hackers accessing emails during a 2023 breach.
390,000+ WordPress Credentials Stolen via Malicious GitHub Repository Hosting PoC ExploitsMUT-1244's attack campaign exploited GitHub to exfiltrate over 390,000 credentials from security researchers and malicious actors.
APT41 Infiltrates Networks in Italy, Spain, Taiwan, Turkey, and the U.K.China-based APT41 targeting organizations worldwide with sustained hacking campaign.
New RAMBO Attack Uses RAM Radio Signals to Steal Data from Air-Gapped NetworksA novel side-channel attack exploits RAM's radio signals for data theft, threatening the security of air-gapped networks.
SquareX Discloses "Browser Syncjacking" , a New Attack Technique that Provides Full Browser and Device Control, Putting Millions at Risk - DevOps.comMalicious browser extensions can hijack entire systems, not just individual browsers.Many popular extensions may unwittingly allow comprehensive access to task.Existing security measures may not sufficiently scrutinize extensions requesting broad permissions.
China-Linked CeranaKeeper Targeting Southeast Asia with Data ExfiltrationCeranaKeeper is a new threat actor linked to aggressive data exfiltration attacks in Southeast Asia, primarily targeting governmental institutions.
Microsoft confirms customer emails were stolen during Midnight Blizzard breachMicrosoft warned customers of Russian hackers accessing emails during a 2023 breach.
390,000+ WordPress Credentials Stolen via Malicious GitHub Repository Hosting PoC ExploitsMUT-1244's attack campaign exploited GitHub to exfiltrate over 390,000 credentials from security researchers and malicious actors.
APT41 Infiltrates Networks in Italy, Spain, Taiwan, Turkey, and the U.K.China-based APT41 targeting organizations worldwide with sustained hacking campaign.
New RAMBO Attack Uses RAM Radio Signals to Steal Data from Air-Gapped NetworksA novel side-channel attack exploits RAM's radio signals for data theft, threatening the security of air-gapped networks.
SquareX Discloses "Browser Syncjacking" , a New Attack Technique that Provides Full Browser and Device Control, Putting Millions at Risk - DevOps.comMalicious browser extensions can hijack entire systems, not just individual browsers.Many popular extensions may unwittingly allow comprehensive access to task.Existing security measures may not sufficiently scrutinize extensions requesting broad permissions.
China-Linked CeranaKeeper Targeting Southeast Asia with Data ExfiltrationCeranaKeeper is a new threat actor linked to aggressive data exfiltration attacks in Southeast Asia, primarily targeting governmental institutions.
OpenAI has evidence that its models helped train China's DeepSeekDeepSeek's AI models challenge OpenAI, suspected of being built using OpenAI's proprietary data.
Vertex AI vulnerabilities left Google customers exposedGoogle Vertex AI had serious vulnerabilities exposing customer LLMs to malicious attacks, emphasizing the need for stricter controls and validations.
ChatGPT macOS Flaw Could've Enabled Long-Term Spyware via Memory FunctionA security flaw in ChatGPT's macOS app could allow persistent spyware to exfiltrate user data through its memory feature.
Microsoft Fixes ASCII Smuggling Flaw That Enabled Data Theft from Microsoft 365 CopilotA vulnerability in Microsoft 365 Copilot allowed sensitive user data theft via a technique called ASCII smuggling, which has since been patched.
New Cuttlefish malware infects routers to monitor traffic for credentialsCuttlefish malware infects routers to steal data and authentication information, active since July 2023.
Ransomware gangs invest in custom data stealing malwareRansomware groups are increasingly using custom malware for data theft instead of just encrypting files. New groups focus on specialized attacks.
As many as 165 companies 'potentially exposed' in Snowflake-related attacks, Mandiant saysData exfiltration attacks target Snowflake customers, impacting 165 organizations.