RA World Ransomware: A Babuk Successor Targets Healthcare
When the Babuk ransomware group disbanded in 2021, it seemed like a minor victory in the ongoing battle against cybercrime. However, the leak of Babuk’s source code has become a...
When the Babuk ransomware group disbanded in 2021, it seemed like a minor victory in the ongoing battle against cybercrime. However, the leak of Babuk’s source code has become a...
The operators behind the invasive Predator mobile spyware remain undeterred by public exposure and scrutiny. Recorded Future’s Insikt Group researchers have exposed the spyware’s rebuilt infrastructure, revealing that Predator is...
The war in Ukraine ignited a new breed of cyber conflict, where hacktivist groups act as proxies for state interests. Russia’s NoName057(16) has become synonymous with the DDoSia project, a...
In a groundbreaking study titled “ComPromptMized: Unleashing Zero-click Worms that Target GenAI-Powered Applications,” researchers unveil a new form of cyber threat that leverages Generative AI (GenAI) ecosystems to proliferate. Dubbed...
Security researchers from NVISO have uncovered two sophisticated TLS-based backdoors, dubbed SparkCockpit and SparkTar, actively targeting critical-sector organizations using Ivanti Pulse Secure appliances. These backdoors demonstrate a worrying escalation in...
Hikvision, a titan in the surveillance solutions industry, recently addressed two security vulnerabilities affecting its centralized security management platform, HikCentral Professional. Used by countless customers worldwide to safeguard assets and...
Apache Ambari simplifies the complexities of managing Hadoop clusters. Ironically, a recently disclosed vulnerability could transform it into an unexpected entry point for attackers. CVE-2023-50378, a stored cross-site scripting (XSS)...
A recent investigation by McAfee Labs has shed light on a significant surge in malware distribution through one of the most ubiquitous document formats: the PDF. This surge marks a...
Recently, SolarWinds has disclosed and patched a serious remote code execution (RCE) vulnerability in its Security Event Manager (SEM) solution. This flaw, tracked as CVE-2024-0692, could allow unauthenticated attackers to...
An independent security researcher has published details and proof-of-concept (PoC) code for a macOS vulnerability (CVE-2023-42942) that could be exploited for root privilege escalation. The Discovery of CVE-2023-42942 The security defect...
A new Linux-based malware, christened GTPDOOR, has emerged with a cunning strategy to infiltrate the heart of telecommunication networks – the GRX (GPRS Roaming Exchange). By harnessing the GPRS Tunneling...
The world of Pay-Per-Install (PPI) malware rarely stands still, and PrivateLoader, a notorious player in this arena, has pulled a new set of tricks out of its sleeve. This widespread...
On February 29th, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) added a recently patched security flaw (CVE-2023-29360) in Microsoft Streaming Service to its Known Exploited Vulnerabilities (KEV) catalog, citing...
The cybersecurity landscape is constantly shifting, and a new, more insidious Linux variant of the Bifrost RAT has emerged, underscoring the importance of heightened vigilance. Discovered by Palo Alto Networks’...
The world of blockchain and angel investing can be thrilling but also fraught with risks. Security experts from Hunt are currently tracking a sophisticated phishing scheme aimed squarely at entrepreneurs...