Attacker Hides Malicious Activity in Emulated Linux Environment

November 5, 2024 at 05:34PM Securonix identified a novel cyberattack campaign, CRON#TRAP, where attackers use an emulated Linux environment to stage malware undetected. This technique, utilizing QEMU and Tiny Core Linux, allows covert data harvesting. Targeting North America, the campaign highlights the need for stronger phishing defenses and endpoint monitoring by organizations. ### Meeting Takeaways … Read more

Android Botnet ‘ToxicPanda’ Bashes Banks Across Europe, Latin America

November 5, 2024 at 04:20PM Researchers have identified a new banking botnet named ToxicPanda, linked to Chinese-speaking threat actors, which targets over 1,500 devices across various countries. This malware exploits Android vulnerabilities for money transfers, undermining multifactor authentication. Cleafy emphasizes the necessity for improved security measures and real-time detection to counter such threats. ### Meeting … Read more

Docusign API Abused in Widescale, Novel Invoice Attack

November 5, 2024 at 11:12AM Cybercriminals are exploiting a Docusign API in a phishing campaign, sending convincing fake invoices to companies. By creating legitimate Docusign accounts, attackers bypass typical security measures. This innovative scam leverages authentic-looking e-sign requests, prompting organizations to verify document origins to prevent fraud, while urging service providers to bolster API security. … Read more

Antivirus, Anti-Malware Lead Demand for AI/ML Tools

November 4, 2024 at 06:26PM Artificial intelligence (AI) and machine learning (ML) are increasingly adopted in cybersecurity, enhancing tools like firewalls and antivirus systems. A Dark Reading survey found significant use in phishing detection and threat response. While many use AI/ML, adoption in areas like fraud detection and user behavior analytics remains developing. **Meeting Takeaways: … Read more

Windows infected with backdoored Linux VMs in new phishing attacks

November 4, 2024 at 10:56AM The ‘CRON#TRAP’ phishing campaign targets Windows systems using deceptive emails to install a Linux virtual machine with a backdoor for stealthy corporate network access. Leveraging the legitimate QEMU tool, attackers ensure persistence and communication via a tunneling program, enabling various malicious actions undetected by security measures. ### Meeting Takeaways on … Read more

GreyNoise Credits AI for Spotting Exploit Attempts on IoT Livestream Cams

November 1, 2024 at 09:30AM GreyNoise Intelligence reported that its internal AI tool identified attempts to exploit critical vulnerabilities in commercial livestream IoT cameras, enhancing security awareness in the IoT sector. This highlights the importance of AI in detecting potential threats. **Meeting Takeaways:** 1. **Internal AI Tool**: GreyNoise Intelligence has developed an internal AI tool … Read more

Hackers target critical zero-day vulnerability in PTZ cameras

October 31, 2024 at 02:26PM Hackers are exploiting two zero-day vulnerabilities (CVE-2024-8956, CVE-2024-8957) in PTZOptics cameras, allowing unauthorized access and potential remote code execution. GreyNoise discovered these flaws, affecting various models, and reported them for responsible disclosure. PTZOptics released an update, but some devices remain unpatched, posing security risks. Users are advised to check with … Read more

New LightSpy Spyware Version Targets iPhones with Increased Surveillance Tactics

October 31, 2024 at 11:21AM Researchers have identified an advanced iOS spyware, LightSpy, which enhances its capabilities and includes destructive functions that can render infected devices unbootable. First discovered in 2020, it captures sensitive data and utilizes various plugins. Suspected to be operated by Chinese attackers, it exploits known security vulnerabilities in Apple’s systems. ### … Read more

A Sherlock Holmes Approach to Cybersecurity: Eliminate the Impossible with Exposure Validation

October 29, 2024 at 08:03AM Sherlock Holmes’ method of deduction parallels cybersecurity’s exposure validation, which focuses on identifying and prioritizing exploitable vulnerabilities among overwhelming data. This approach enhances security posture by optimizing resources, reducing risks, and ensuring compliance. Automation in validation is crucial for efficiency, enabling organizations to respond effectively to real threats. ### Meeting … Read more

Sophos-SecureWorks Deal Focuses on Building Advanced MDR, XDR Platform

October 28, 2024 at 07:24PM Sophos is acquiring SecureWorks for $859 million to enhance its managed detection and response (MDR) capabilities using SecureWorks’ Taegis platform. This deal aims to strengthen Sophos’ presence in enterprise security services, integrating secure operations while addressing the growing demand for managed security solutions amidst a tight labor market. **Meeting Takeaways: … Read more