Author: nlqip
Exploiting Mistyped URLs Interesting research: “Hyperlink Hijacking: Exploiting Erroneous URL Links to Phantom Domains“: Abstract: Web users often follow hyperlinks hastily, expecting them to be correctly programmed. However, it is possible those links contain typos or other mistakes. By discovering active but erroneous hyperlinks, a malicious actor can spoof a website or service, impersonating the…
Read MoreWhat is Operational Technology? Operational Technology (OT) is the backbone of our modern world as we know it today. Think about the daily operations of a factory, the precise control of our power grids, and even the supply of clean water to our homes. All of these modern capabilities are made possible and efficient due…
Read MoreMorocco as an emerging cybercrime originator Although cybercrime operations are a global phenomenon, most financially motivated cybercriminals operate from a well-understood list of countries, including China, Russia, Ukraine, the US, Romania, and Nigeria. But at this year’s Sleuthcon, a new nation emerged that threatens to break into the ranks of top cybercrime havens: Morocco. Microsoft…
Read MoreJun 10, 2024NewsroomCyber Espionage / Malware Cybersecurity researchers have disclosed details of a threat actor known as Sticky Werewolf that has been linked to cyber attacks targeting entities in Russia and Belarus. The phishing attacks were aimed at a pharmaceutical company, a Russian research institute dealing with microbiology and vaccine development, and the aviation sector,…
Read MoreAnd in another similarity to conventional attack types, “nation-states are probably one of the biggest risks here because they have the ability and resources to invest in this [type of attack],” says David Youssef a managing director at FTI Consulting and leader of the North America incident response efforts for the firm’s cybersecurity practice. Bad…
Read MoreBrave browser experienced its most significant growth month ever in May 2024, now used by more than 78.95 million monthly users, up 7.3%. The privacy-focused web browser experienced substantial growth in Latin America, where the browser became one of the top apps in the Google Play Store in several countries. Using the historical method, the Brave’s monthly…
Read MoreA group of Israeli researchers explored the security of the Visual Studio Code marketplace and managed to “infect” over 100 organizations by trojanizing a copy of the popular ‘Dracula Official theme to include risky code. Visual Studio Code (VSCode) is a source code editor published by Microsoft and used by many professional software developers worldwide.…
Read MoreA group of Israeli researchers explored the security of the Visual Studio Code marketplace and managed to “infect” over 100 organizations by trojanizing a copy of the popular ‘Dracula Official theme to include risky code. Visual Studio Code (VSCode) is a source code editor published by Microsoft and used by many professional software developers worldwide.…
Read MoreInternal source code and data belonging to The New York Times was leaked on the 4chan message board after being stolen from the company’s GitHub repositories in January 2024, The Times confirmed to BleepingComputer. As first seen by VX-Underground, the internal data was leaked on Thursday by an anonymous user who posted a torrent to a…
Read MoreHacktivists are conducting DDoS attacks on European political parties that represent and promote strategies opposing their interests, according to a report by Cloudflare. The European Parliament elections are already underway in the Netherlands and are set to begin in 26 more countries across the EU over the coming days, igniting politically motivated cyberattacks. Cloudflare reports…
Read MoreRecent Posts
- Accenture Boosts Anaplan Capabilities With Allitix Purchase
- Cynomi Hires Security Vet Ken Marks As CRO To Drive vCISO Platform Growth
- Google fixes two Android zero-days used in targeted attacks
- Schneider Electric Investigating Security ‘Incident’ After Reported Hacker Claims
- CISA Director Jen Easterly Stands Watch in the Cyberwars