Security experts uncovered a North Korean-linked cyberespionage group targeting Russian embassy diplomats with weaponized email attachments. Dubbed Konni, the threat actor group reportedly sent New Year greeting emails embedded with malware to infect the victim’s device. The Konni malware...
User login credentials continue to become a primary target for cybercriminals, as they provide access to organizations’ critical infrastructures. Threat actors increasingly use various attack vectors like credential stuffing to steal classified data like usernames and passwords.
The New York...
Today’s hyper-connected workplace requires CISOs to wear multiple hats – technologist, evangelist, investigator, negotiator. It is now widely understood that cyberattacks can disrupt business operations and impact revenue growth and that managing and mitigating risk is a responsibility shared...
Supply chain attacks can devastate organizations’ critical infrastructures as one single weak link can enable threat actors to victimize the entire network. Recently, security experts from Unit42 found a supply chain attack using a cloud video platform to spread...
A few days into 2022, ransomware operators have already started targeting organizations with various extortion schemes. Security experts were alarmed about a novel ransomware variant - Lapsus$, disrupting operations of media firms in Portugal. The ransomware reportedly targeted Impresa,...
Every year, during the holiday season, we see major attacks on organizations or critical infrastructure. In Dec. 2020, it was ransomware attacks on health care institutions. And last month, it was the Log4j vulnerability, which has affected myriad applications....
It has become routine for cybercriminals to spread their customized malware via fake mobile applications. Security experts from Minerva Labs recently found threat actors leveraging malicious Telegram applications to distribute customized malware dubbed Purple Fox on targeted devices.
“This threat...
Making predictions in cybersecurity or any discipline or field can be quite challenging. First, it is virtually impossible to predict the future – consider the emergence of the pandemic and how that has affected so many different functions, including...
As we roll into the new year, many new vulnerabilities are being uncovered, exposing organizations’ critical digital assets to various cyber risks. It seems Microsoft welcomed the year 2022 with a security issue that prevents its Exchange servers from...
Today’s browsers have an auto-login feature that saves passwords for frequently used online services. While saving passwords in browsers is convenient, it is not a good idea. A new analysis uncovered an info-stealing malware dubbed Redline targeting web browsers...