Recent Security News
-
Swinfen Charitable Trust, UVA Health, Telemedicine AI, and MITRE Collaborate on Secure Global Health Telemedicine
December 14, 2023 at 05:27PM Swinfen Charitable Trust, UVA Health, Telemedicine AI, and MITRE have announced a collaboration to improve global health services. This partnership aims to enhance cyber infrastructure protection assessments for the OpenTelemed telemedicine platform, along with providing educational resources and cyber technology training to the Trust’s health professionals in 96 countries. For…
-
Volt Typhoon-Linked SOHO Botnet Infects Multiple US Gov’t Entities
December 14, 2023 at 05:20PM Lumen’s Black Lotus Labs recently identified the KV-Botnet, a sophisticated Internet of Things (IoT) botnet targeting US government and communications organizations. The botnet infects network devices from various vendors and is connected to the Chinese state-aligned Volt Typhoon threat actor. It features advanced stealth mechanisms and the ability to deploy…
-
New ‘GambleForce’ Threat Actor Behind String of SQL Injection Attacks
December 14, 2023 at 05:20PM Group-IB has detected a new threat group, “GambleForce,” engaged in SQL injection attacks on organizations in the Asia-Pacific region. This group has targeted various sectors, including gambling, government, retail, travel, and job websites, using publicly available penetration-testing tools. The threat actor’s activities have led to data breaches in multiple organizations,…
-
New NKAbuse malware abuses NKN blockchain for stealthy comms
December 14, 2023 at 05:16PM NKAbuse is a new Go-based multi-platform malware exploiting NKN (New Kind of Network) technology. It targets Linux desktops, IoT devices, and supports MIPS, ARM, and 386 architectures. It uses NKN for DDoS attacks and as a remote access trojan, making it difficult to detect and defend against. Its use of…
-
Microsoft seizes websites used to sell phony email accounts to Scattered Spider and other crims
December 14, 2023 at 05:02PM Microsoft took down US-based infrastructure and websites used by the cybercrime group, Storm-1152, to sell fraudulent online accounts, earning “millions of dollars” in ill-gotten gains. The gang leaders, based in Vietnam, operated and wrote code for the illicit websites, victimizing Microsoft and other tech companies, and aiding clients in ransomware…