How Intelligence Sharing Can Help Keep Major Worldwide Sporting Events on Track

July 5, 2024 at 07:52AM Major worldwide sporting events like Olympics and the FIFA World Cup attract global interest, but also face cybersecurity threats. The 2024 Paris Olympic Games are expected to have 4 billion viewers. Such events have been targeted by cybercriminals in the past, making robust cybersecurity strategies and threat intelligence sharing essential … Read more

Europol nukes nearly 600 IP addresses in Cobalt Strike crackdown

July 4, 2024 at 04:36AM Europol led Operation Morpheus to tackle nearly 600 illegal IP addresses associated with Cobalt Strike. The disruptive action targeted criminal activity, involving partners in 27 countries. Notable support was provided by private sector partners and Europol’s Malware Information Sharing Platform. The operation sent a strong message to cybercriminals globally. However, … Read more

Chinese Hackers Exploiting Cisco Switches Zero-Day to Deliver Malware

July 2, 2024 at 02:08AM Velvet Ant, a Chinese cyber espionage group, has exploited a zero-day flaw in Cisco NX-OS Software to deliver custom malware and gain control over compromised Cisco Nexus devices. This vulnerability, CVE-2024-20399, allows an attacker with administrator credentials to execute commands as root. The impacted devices include various Nexus switches. Additionally, … Read more

Indian Software Firm’s Products Hacked to Spread Data-Stealing Malware

July 1, 2024 at 09:06AM On June 18, 2024, cybersecurity firm Rapid7 discovered trojanized installers for three software products from Indian company Conceptworld, distributing information-stealing malware. The compromise was remediated by Conceptworld within 12 hours of disclosure. The malware is capable of stealing browser credentials, cryptocurrency wallet information, logging keystrokes, and establishing connections with command-and-control … Read more

Combatting the Evolving SaaS Kill Chain: How to Stay Ahead of Threat Actors

June 28, 2024 at 08:10AM Enterprises are struggling to secure their modern business infrastructure, specifically SaaS, as they continue to rely on outdated security programs. The shared responsibility model in SaaS requires customers to take ownership of components that are often targeted by threat actors, leading to growing SaaS attack activity. Implementing a true Zero … Read more

Attackers in Profile: menuPass and ALPHV/BlackCat

June 26, 2024 at 11:50AM MITRE Engenuity combined the tactics of cyber attackers menuPass and ALPHV/BlackCat to evaluate the effectiveness of managed security services. The blog highlights the selection of these sophisticated threat actors and their targeting of managed service providers. Trend Micro achieved 100% detection in the assessment, emphasizing the significance of advanced cybersecurity … Read more

New Medusa Android Trojan Targets Banking Users Across 7 Countries

June 26, 2024 at 04:39AM Researchers discovered an updated version of the Android banking trojan, Medusa, targeting users in multiple countries. The trojan features new capabilities and uses fake updates and dropper apps for distribution. Its reduced permissions and expanded geographic reach make it harder to detect. Similar campaigns distributing another Android malware, SpyMax, have … Read more

China-Linked Cyber-Espionage Teams Target Asian Telecoms

June 24, 2024 at 09:08PM Multiple cyber-espionage groups compromised telecommunications operators in Asia-Pacific, using custom malware and backdoors. China-linked groups including Fireant, Neeedleminer, and Firefly were involved, targeting at least two countries. The attacks pose risks of eavesdropping, surveillance, and potential disruption to target countries’ critical infrastructure. Nations in the region continue to face escalating … Read more

Ease the Burden with AI-Driven Threat Intelligence Reporting

June 24, 2024 at 07:30AM Cybersixgill’s threat experts highlight critical threats and the challenges faced by cybersecurity professionals in managing increasing workloads amidst limited budgets, inadequate staffing, and growing attack surfaces. The shortage of skilled professionals and the time-consuming nature of producing reports are major obstacles. Cybersixgill’s IQ Report Generator offers a solution, providing rapid, … Read more

Multiple Threat Actors Deploying Open-Source Rafel RAT to Target Android Devices

June 24, 2024 at 01:30AM Cyber espionage groups are using an Android remote administration tool, Rafel RAT, disguised as popular apps like Instagram and WhatsApp. This tool can perform various malicious activities like data theft and device manipulation. It has been used in cyber attacks targeting high-profile entities across multiple countries. It highlights the need … Read more