IT Information Security

Experts warn of a surge of TrueBot activity in May 2023Experts warn of a surge of TrueBot activity in May 2023

Experts warn of a surge of TrueBot activity in May 2023

VMware’s Carbon Black Managed Detection and Response (MDR) team observed a surge of TrueBot activity in May 2023. Researchers at…

2 years ago
Magecart campaign abuses legitimate sites to host web skimmers and act as C2Magecart campaign abuses legitimate sites to host web skimmers and act as C2

Magecart campaign abuses legitimate sites to host web skimmers and act as C2

A new ongoing Magecart web skimmer campaign abuse legitimate websites to act as makeshift command and control (C2) servers. Akamai…

2 years ago
Spanish bank Globalcaja confirms Play ransomware attackSpanish bank Globalcaja confirms Play ransomware attack

Spanish bank Globalcaja confirms Play ransomware attack

Play ransomware group claims responsibility for a ransomware attack that hit Globalcaja, one of the major banks in Spain. Globalcaja…

2 years ago
Security Affairs newsletter Round 422 by Pierluigi Paganini – International editionSecurity Affairs newsletter Round 422 by Pierluigi Paganini – International edition

Security Affairs newsletter Round 422 by Pierluigi Paganini – International edition

A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from Security Affairs are free…

2 years ago
Xplain hack impacted the Swiss cantonal police and FedpolXplain hack impacted the Swiss cantonal police and Fedpol

Xplain hack impacted the Swiss cantonal police and Fedpol

Several Swiss cantonal police, the army, customs and the Federal Office of Police (Fedpol) were impacted by the attack against…

2 years ago
Zyxel published guidance for protecting devices from ongoing attacksZyxel published guidance for protecting devices from ongoing attacks

Zyxel published guidance for protecting devices from ongoing attacks

Zyxel has published guidance for protecting firewall and VPN devices from the ongoing attacks recently discovered. Zyxel has published guidance…

2 years ago
Kimsuky APT poses as journalists and broadcast writers in its attacksKimsuky APT poses as journalists and broadcast writers in its attacks

Kimsuky APT poses as journalists and broadcast writers in its attacks

North Korea-linked APT group Kimsuky is posing as journalists to gather intelligence, a joint advisory from NSA and FBI warns.…

2 years ago
New Linux Ransomware BlackSuit is similar to Royal ransomwareNew Linux Ransomware BlackSuit is similar to Royal ransomware

New Linux Ransomware BlackSuit is similar to Royal ransomware

Experts noticed that the new Linux ransomware BlackSuit has significant similarities with the Royal ransomware family. Royal ransomware is one of the most…

2 years ago
CISA adds Progress MOVEit Transfer zero-day to its Known Exploited Vulnerabilities catalogCISA adds Progress MOVEit Transfer zero-day to its Known Exploited Vulnerabilities catalog

CISA adds Progress MOVEit Transfer zero-day to its Known Exploited Vulnerabilities catalog

US CISA added actively exploited Progress MOVEit Transfer zero-day vulnerability to its Known Exploited Vulnerabilities catalog. US Cybersecurity and Infrastructure…

2 years ago
New botnet Horabot targets Latin AmericaNew botnet Horabot targets Latin America

New botnet Horabot targets Latin America

A new botnet malware dubbed Horabot is targeting Spanish-speaking users in Latin America since at least November 2020. Cisco Talos researchers were…

2 years ago