Large-scale cryptomining campaign is targeting the NPM JavaScript package repository

4 years ago

Researchers uncovered a large-scale cryptocurrency mining campaign targeting the NPM JavaScript package repository. Checkmarx researchers spotted a new large-scale cryptocurrency…

North Korea-linked APTs use Maui Ransomware to target the Healthcare industry

4 years ago

US authorities have issued a joint advisory warning of North Korea-linked APTs using Maui ransomware in attacks against the Healthcare…

ENISA released the Threat Landscape Methodology

4 years ago

I'm proud to announce that the European Union Agency for Cybersecurity, ENISA, has released the Threat Landscape Methodology. Policy makers,…

OrBit, a new sophisticated Linux malware still undetected

4 years ago

Cybersecurity researchers warn of new malware, tracked as OrBit, which is a fully undetected Linux threat. Cybersecurity researchers at Intezer…

OpenSSL version 3.0.5 fixes a flaw that could potentially lead to RCE

4 years ago

The development team behind the OpenSSL project fixed a high-severity bug in the library that could potentially lead to remote code execution.…

Marriott International suffered a new data breach, attackers stole 20GB of data

4 years ago

Hotel chain Marriott International suffered a new data breach, a threat actor has stolen 20GB from the company. Hotel chain…

Cyberattacks against law enforcement are on the rise

4 years ago

Experts observed an increase in malicious activity targeting law enforcement agencies at the beginning of Q2 2022. Resecurity, a Los…

Less popular, but very effective, Red-Teaming Tool BRc4 used in attacks in the wild

4 years ago

Threat actors are abusing legitimate adversary simulation software BRc4 in their campaigns to evade detection. Researchers from Palo Alto Networks…

New Hive ransomware variant is written in Rust and use improved encryption method

4 years ago

Hive ransomware operators have improved their file-encrypting module by migrating to Rust language and adopting a more sophisticated encryption method.…

Malicious NPM packages used to grab data from apps, websites

4 years ago

Researchers from ReversingLabs discovered tens of malicious NPM packages stealing data from apps and web forms. Researchers from ReversingLabs discovered…

This website uses cookies.