COMMENT Foreign adversaries have been trying to disrupt American elections through various methods for years. This includes espionage and “hack and leak” campaigns that steal sensitive data and then amplify…
Category: Cyber Security
Akira Ransomware Gang Extorts $42 Million; It now targets Linux servers
Threat actors behind the Akira ransomware group have extorted approximately $42 million in illicit proceeds after breaching the networks of more than 250 victims as of January 1, 2024. “Since…
Cisco’s complex journey to deliver on the Hypershield promise
There is no shortage of problems in the cybersecurity industry: Attackers are using automation to reduce attack times, patching software is costly, establishing defenses such as segmentation remains difficult, and…
Windows “MagicDot” weakness allows unprivileged rootkit activity
A known issue associated with the DOS-NT path conversion process in Windows poses significant risks to businesses by allowing attackers to gain rootkit-like post-exploitation capabilities to hide and impersonate files,…
The Russian group APT foiled the attack on the US car manufacturer
Researchers this week shared details of an attack campaign by the infamous FIN7 threat group which had targeted a large US-based global automotive manufacturer. FIN7, a Russian Advanced Persistent Threat…
Hackers target Middle Eastern governments with evasive ‘CR4T’ backdoor.
April 19, 2024PressroomCyber espionage/threat intelligence Government bodies in the Middle East were targeted as part of a previously undocumented campaign to deliver a new backdoor called CR4T. Russian cybersecurity firm…
A researcher turns Palo Alto software into perfect malware
A creative exploit of Palo Alto Networks’ Extended Detection and Response (XDR) software could have allowed attackers to turn it into a malicious multitool. In a briefing at Black Hat…
Cyberattack takes border communications offline
Texas-based Frontier Communications, which provides local residential and business telecommunications services in 25 states, has shut down its operations following a cyber attack that resulted in the theft of personally…
GPT-4 can exploit most vulnerabilities simply by reading threat alerts
AI agents equipped with GPT-4 can exploit most of the public vulnerabilities affecting real-world systems today, simply by reading about them online. New discoveries from the University of Illinois Urbana-Champaign…
ICS network controllers open for remote exploitation, no patches available
A security advisory issued this week by the Cybersecurity and Infrastructure Security Agency (CISA) alerts administrators to vulnerabilities in two industrial control system devices: Unitronics Vision Series and Mitsubishi Electric…