Discover and connect with journalists and influencers around the world, save time on email research, monitor the news, and more.
Recent: |
|
Past: |
|
Researchers demonstrate how attackers can use the GPT-3 natural language model to launch more effective, harder-to-detect phishing and business email compromise campaigns. → Read More
The decline of big ransomware groups like Conti and REvil has given rise to smaller gangs, presenting a threat intelligence challenge. → Read More
The group combines data encryption with data theft and threatens to release stolen information on their website. But Ransom Cartel ups its game by threatening to send sensitive information to victim’s partners, competitors, and news outlets to inflict as much damage as possible. → Read More
The two vulnerabilities in OpenSSL 3.0 are now rated as high rather than critical severity after further testing. → Read More
This first known exploit of the Dell vulnerability might inspire other malware developers who want to avoid detection of their code. → Read More
A possibly new threat actor packaged and deployed backdoors as vSphere Installation Bundles, gaining remote code execution and persistence capabilities. → Read More
Corrupting files is faster, cheaper, and less likely to be stopped by endpoint protection tools than encrypting them. → Read More
Lazarus has used the new remote access Trojan in campaigns that exploit the Log4Shell vulnerability and target energy companies. → Read More
Hybrid cloud identity and access management services add complexity and opportunity for attackers to network authentication processes, as recently demonstrated for Azure AD. → Read More
Ransomware gangs seem to be exploiting concerns over disruptions in the energy and other critical infrastructure sectors. → Read More
The Nitrokod cryptocurrency mining campaign goes to great lengths to avoid detection and can remain active for years. → Read More
The HavanaCrypt ransomware has data exfiltration capabilities and goes to great lengths to avoid analysis. → Read More
Researchers demonstrate a proof of concept where hijacked programmable logic controllers can compromise engineering workstations to allow lateral movement. → Read More
The Black Basta ransomware gang has reached a high level of success in a short time and is possibly an offshoot of Conti and REvil. → Read More
The investigation by the federal agency shows not only the indicators of compromise but also the reasons why the Log4j vulnerability will persist indefinitely. → Read More
Unlike other speculative execution attacks like Spectre, Retbleed exploits return instructions rather than indirect jumps or calls. → Read More
Criminal use of the LockBit ransomware as a service is growing rapidly thanks to updates to the malware and the decline of other ransomware gangs. → Read More
Atlassian has issued emergency patches for the vulnerability, which could allow attackers to perform remote code execution. → Read More
The malware, dubbed Denonia, is written in Go for easier deployment and uses AWS's own open-source Go libraries. → Read More
The node-ipc developer attempt to protest Russia's attack on Ukraine has the unintended consequence of casting more doubt in software supply chain integrity. → Read More