Researchers Uncover Cicada3301 Ransomware Operations and Its Affiliate Program
Oct 17, 2024Ravie LakshmananRansomware / Network Security
Cybersecurity researchers have gleaned additional insights into a nascent ransomware-as-a-service (RaaS) called Cicada3301 after successfully gaining access...
SideWinder APT Strikes Middle East and Africa With Stealthy Multi-Stage Attack
An advanced persistent threat (APT) actor with suspected ties to India has sprung forth with a flurry of attacks against high-profile entities and...
5 Ways to Reduce SaaS Security Risks
As technology adoption has shifted to be employee-led, just in time, and from any location or device, IT and security teams have found...
U.S. Charges Two Sudanese Brothers for Record 35,000 DDoS Attacks
Federal prosecutors in the U.S. have charged two Sudanese brothers with running a distributed denial-of-service (DDoS) botnet for hire that conducted a record...
Critical Kubernetes Image Builder Vulnerability Exposes Nodes to Root Access Risk
Oct 17, 2024Ravie LakshmananVulnerability / Kubernetes
A critical security flaw has been disclosed in the Kubernetes Image Builder that, if successfully exploited, could be...
Hackers Abuse EDRSilencer Tool to Bypass Security and Hide Malicious Activity
Oct 16, 2024Ravie LakshmananEndpoint Security / Malware
Threat actors are attempting to abuse the open-source EDRSilencer tool as part of efforts to tamper endpoint...
FIDO Alliance Drafts New Protocol to Simplify Passkey Transfers Across Different Platforms
Oct 16, 2024Ravie LakshmananData Privacy / Passwordless
The FIDO Alliance said it's working to make passkeys and other credentials more easier to export across...
North Korean ScarCruft Exploits Windows Zero-Day to Spread RokRAT Malware
Oct 16, 2024Ravie LakshmananZero-Day / Windows Security
The North Korean threat actor known as ScarCruft has been linked to the zero-day exploitation of a...
From Misuse to Abuse: AI Risks and Attacks
Oct 16, 2024The Hacker NewsArtificial Intelligence / Cybercrime
AI from the attacker's perspective: See how cybercriminals are leveraging AI and exploiting its vulnerabilities to...