The sneaky malware packs capabilities for system reconnaissance as well as credential and cryptocurrency theft. ​The original article found on darkreading Read More
Category: Cyber Security News
Black Basta Leader in League With Russian Officials, Chat Logs Show
Though the chat logs were leaked a month ago, analysts are now seeing that Russian officials may have assisted Black Basta members according, to the […]
Extortion Reboot: Ransomware Crew Threatens Leak to Snowden
Though the group initially stuck to classic ransomware TTPs before demanding the ransom, it went off script when it began threatening the group and detailing […]
New ‘Rules File Backdoor’ Attack Lets Hackers Inject Malicious Code via AI Code Editors
Cybersecurity researchers have disclosed details of a new supply chain attack vector dubbed Rules File Backdoor that affects artificial intelligence (AI)-powered code editors like GitHub […]
Actively Exploited ChatGPT Bug Puts Organizations at Risk
A server-side request forgery vulnerability in OpenAI’s chatbot infrastructure can allow attackers to direct users to malicious URLs, leading to a range of threat activity. […]
Orion Security Startup Tackles Insider Threats With AI
The data loss prevention company emerges from stealth with an AI-powered platform to help organizations distinguish between legitimate and risky activity. ​The original article found […]
Unpatched Windows Zero-Day Flaw Exploited by 11 State-Sponsored Threat Groups Since 2017
An unpatched security flaw impacting Microsoft Windows has been exploited by 11 state-sponsored groups from China, Iran, North Korea, and Russia as part of data […]
Google Acquires Wiz for $32 Billion in Its Biggest Deal Ever to Boost Cloud Security
Google is making the biggest ever acquisition in its history by purchasing cloud security company Wiz in an all-cash deal worth $32 billion. “This acquisition […]
New Critical AMI BMC Vulnerability Enables Remote Server Takeover and Bricking
A critical security vulnerability has been disclosed in AMI’s MegaRAC Baseboard Management Controller (BMC) software that could allow an attacker to bypass authentication and carry […]
3 AI-Driven Roles in Cybersecurity
For candidates with a cybersecurity background who want to stay competitive, now is the time to invest in obtaining AI skills. ​The original article found […]