A new security hole discovered in Apple’s M-series chips could be exploited to extract secret keys used during cryptographic operations. Nicknamed GoFetch, the vulnerability refers to a microarchitectural side-channel attack…
Category: Cyber Security
Iran-linked MuddyWater uses Atera to monitor phishing attacks
March 25, 2024PressroomCyber espionage/email security Iran-affiliated threat actor tracked as Muddy water (also known as Mango Sandstorm or TA450) has been linked to a new phishing campaign in March 2024…
German police seize the “Nemesis market” in a major international raid on the darknet
March 24, 2024PressroomRansomware/Threat Intelligence German authorities have announced the removal of an illicit underground market called The Nemesis Market who dealt narcotics, stolen data and various cybercrime services. The Federal…
North Korea-linked Kimsuky switches to compiled HTML Help files in ongoing cyberattacks
March 24, 2024PressroomArtificial intelligence/cyber espionage The dangerous actor linked to North Korea known as Kimsuky (also known as Black Banshee, Emerald Sleet, or Springtail) has been observed changing tactics, leveraging…
AceCryptor attacks increase in Europe – Security Week with Tony Anscombe
video The second half of 2023 saw massive growth in the spread of malware containing AceCryptor, also courtesy of multiple spam campaigns in which AceCryptor packaged the Rescoms RAT March…
Cloud Threat Detection with CloudGappler
As organizations increasingly depend on cloud infrastructure for their operations, enterprise defenders need tools that can help them monitor their cloud environments and detect threat actors before they can cause…
Russian hackers use ‘WINELOADER’ malware to target German political parties
March 23, 2024PressroomCyber espionage/cyber warfare The WINELOADER backdoor used in recent cyberattacks against diplomatic entities with wine tasting phishing lures has been attributed to the work of a hacking group…
Russian intelligence is targeting victims around the world with rapid-fire cyberattacks
Russian state hackers are conducting targeted phishing campaigns in at least nine countries across four continents. Their emails advertise official government business and, if successful, threaten not only the organization’s…
The Connectivity Standards Alliance addresses device security challenges
COMMENT Since the discovery of the Mirai botnet in 2016, governments, businesses and consumers have noticed the impact of insecure Internet of Things (IoT) devices. It has become commonplace that…
Pay attention to how the AI uses your data
Businesses are increasingly adopting generative AI to automate IT processes, detect security threats, and take control of front-line customer service functions. A IBM survey in 2023 found that 42% of…