Author: nlqip
May 10, 2024NewsroomMalware / Cyber Espionage The North Korean threat actor tracked as Kimsuky has been observed deploying a previously undocumented Golang-based malware dubbed Durian as part of highly-targeted cyber attacks aimed at South Korean cryptocurrency firms. “Durian boasts comprehensive backdoor functionality, enabling the execution of delivered commands, additional file downloads and exfiltration of files,”…
Read MoreBoeing has confirmed that it received a demand for a massive $200 million after a ransomware attack by the notorious LockBit hacking group in October 2023. The company confirmed its link to the indictment of Dmitry Yuryevich Khoroshev, who was identified this week by the US Department of Justice as the true identity of LockBitSupp,…
Read MoreMay 10, 2024The Hacker NewsArtificial Intelligence / Threat Hunting Artificial intelligence (AI) is transforming cybersecurity, and those leading the charge are using it to outsmart increasingly advanced cyber threats. Join us for an exciting webinar, “The Future of Threat Hunting is Powered by Generative AI,” where you’ll explore how AI tools are shaping the future…
Read MoreCybersecurity Snapshot: New Guide Explains How To Assess If Software Is Secure by Design, While NIST Publishes GenAI Risk Framework
- by nlqip
Is the software your company wants to buy securely designed? A new guide outlines how you can find out. Meanwhile, a new NIST framework can help you assess your GenAI systems’ risks. Plus, a survey shows a big disconnect between AI usage (high) and AI governance (low). And MITRE’s breach post-mortem brims with insights and…
Read MoreThe message from customers — that they expect security products to work well together — is increasingly being acted upon around the industry, top vendor and solution provider executives told CRN this week. Cybersecurity vendors are putting more emphasis on meeting the needs of customers through integrating effectively with products from other vendors, reflecting a…
Read MoreCapgemini, Miracle Software Systems and Presidio were among the standout solution providers at Red Hat Summit 2024. One of the central messages throughout Red Hat’s Summit 2024 event was that the open source enterprise tools vendor sees solution providers as integral in meeting customer demand in multiple technology opportunities, including artificial intelligence and virtualization. During…
Read MoreMalicious Android apps masquerading as Google, Instagram, Snapchat, WhatsApp, and X (formerly Twitter) have been observed to steal users’ credentials from compromised devices. “This malware uses famous Android app icons to mislead users and trick victims into installing the malicious app on their devices,” the SonicWall Capture Labs threat research team said in a recent…
Read MoreThe type of information stolen is believed to include name, physical address, and purchase order details. No sensitive information breached On April 28, Menelik listed stolen data from Dell on BreachForum that included customer information with non-financial fields such as City, Full Name, Address, Province, Postal Code, Warranty plan, Company name, Dell Order Number, Dell…
Read MoreA guide to finding the right endpoint detection and response (EDR) solution for your business’ unique needs. Cybersecurity has become an ongoing battle between hackers and small- and mid-sized businesses. Though perimeter security measures like antivirus and firewalls have traditionally served as the frontlines of defense, the battleground has shifted to endpoints. This is why…
Read MoreMay 10, 2024NewsroomBrowser Security / Vulnerability Google on Thursday released security updates to address a zero-day flaw in Chrome that it said has been actively exploited in the wild. Tracked as CVE-2024-4671, the high-severity vulnerability has been described as a case of use-after-free in the Visuals component. It was reported by an anonymous researcher on…
Read MoreRecent Posts
- Microsoft just killed the Windows 10 Beta Channel again
- Fraud network uses 4,700 fake shopping sites to steal credit cards
- CISA warns of more Palo Alto Networks bugs exploited in attacks
- New Glove infostealer malware bypasses Chrome’s cookie encryption
- New Glove Stealer malware bypasses Chrome’s cookie encryption