UAC-0184 targets a Ukrainian entity in Finland with Remcos RAT

The threat actor tracked as UAC-0184 was using steganography techniques to deliver the Remcos Remote Access Trojan (RAT) via relatively new malware known as IDAT Loader, to a Ukrainian target…

Cyber ​​attackers lure European diplomats with offers of wine tastings

Europeans are known to appreciate good wine, a cultural trait that has been used against them by attackers behind a recent threat campaign. The cyber operation aimed to provide a…

Build your privacy-compliant Customer Data Platform (CDP) with first-party data

February 28, 2024News about hackersWebinars/Privacy In today’s digital age, data privacy is not just a concern; it is a consumer request. Companies are grappling with the dual challenge of leveraging…

“Seahorse Expert” Hackers Debut New CNAME DNS Trick

A newly discovered threat actor is running an investment scam through a cleverly designed traffic distribution system (TDS), which leverages the Domain Name System (DNS) to keep its malicious domains…

Iran-Linked UNC1549 Hackers Target Middle East Aerospace and Defense Sectors

February 28, 2024PressroomCyber ​​espionage/Malware An Iranian nexus threat actor known as UNC1549 has been attributed with medium certainty to a new series of attacks against aerospace, aviation and defense industries…

The convergence of state privacy laws and the emerging challenge of artificial intelligence

Eight U.S. states passed data privacy legislation in 2023, and in 2024 laws will take effect in four, including Oregon, Montana and Texas, each with comprehensive state privacy laws, and…

FBI warns US healthcare sector of targeted BlackCat ransomware attacks

February 28, 2024PressroomRansomware/Healthcare The US government is warning about the resurgence of BlackCat (aka ALPHV) ransomware attacks against the healthcare sector as recently as this month. “Since mid-December 2023, of…

White House urges shift to memory-safe languages

THE The latest technical report from the Office of the National Cyber ​​Director urged developers to switch to using memory-safe programming languages in an effort to reduce the number of…

How to connect privileged access management and identity management

February 28, 2024News about hackersZero Trust/cyber threat Traditional perimeter-based security has become expensive and ineffective. As a result, securing communications between people, systems, and networks is more important than blocking…

eBay, VMware and McAfee sites hacked in extensive phishing operations

The attackers compromised more than 8,000 subdomains of well-known brands and institutions to organize a vast phishing campaign that sends millions of malicious emails every day. MSN, VMware, McAfee, The…