General Security News
-
NBA Cyber Incident – Fans’ Personal Information Exposed
As a result of a recent data breach, the NBA notified all its fans about the fact that a significant amount of personal information was...
-
Beware of New Trigona Ransomware Attacking Finance and Marketing Industries
The relatively new Trigona ransomware strain, according to Unit 42 researchers, was particularly active in December 2022, targeting industries in...
-
Fake Calls Android Malware Attacking Android Users to Steal Banking Details
An Android Trojan dubbed “FakeCalls” was spotted by the Check Point Research team. This malware can pretend to be one of more than 20 financial...
-
Emotet Rises Again: Evades Macro Security via OneNote Attachments
The notorious Emotet malware, in its return after a short hiatus, is now being distributed via Microsoft OneNote email attachments in an attempt to...
-
Chinese Hackers Exploit Fortinet Zero-Day Flaw for Cyber Espionage Attack
The zero-day exploitation of a now-patched medium-severity security flaw in the Fortinet FortiOS operating system has been linked to a suspected...
-
Pompompurin Unmasked: Infamous BreachForums Mastermind Arrested in New York
U.S. law enforcement authorities have arrested a New York man in connection with running the infamous BreachForums hacking forum under the online...
-
Winter Vivern APT Group Targeting Indian, Lithuanian, Slovakian, and Vatican Officials
The advanced persistent threat known as Winter Vivern has been linked to campaigns targeting government officials in India, Lithuania, Slovakia,...
-
Google Uncovers 18 Severe Security Vulnerabilities in Samsung Exynos Chips
Google is calling attention to a set of severe security flaws in Samsung's Exynos chips, some of which could be exploited remotely to completely...
-
CISA Urgent Warning: Adobe ColdFusion Bug Exploited As A Zero-day in the Wild
CISA has updated its list of security flaws that have been actively exploited, including a critical vulnerability affecting Adobe ColdFusion...
-
US Federal Agency Hacked By Exploiting Telerik Vulnerability in IIS Server
As a result of a joint effort of the CISA, FBI, and MS-ISAC, a public advisory was published recently. This public advisory claims that between...
-
Chinese and Russian Hackers Using SILKLOADER Malware to Evade Detection
Threat activity clusters affiliated with the Chinese and Russian cybercriminal ecosystems have been observed using a new piece of malware that's...
-
Cryptojacking Group TeamTNT Suspected of Using Decoy Miner to Conceal Data Exfiltration
The cryptojacking group known as TeamTNT is suspected to be behind a previously undiscovered strain of malware used to mine Monero cryptocurrency...