Security
Headlines
HeadlinesLatestCVEs

Source

DARKReading

Cybercrime Group TA4563 Targets DeFi Market With Evolving Evilnum Backdoor

The cyber campaign, aimed at siphoning funds, uses an improved version of the malware, which can adjust infection paths based on recognized antivirus software.

DARKReading
#vulnerability#microsoft#git#intel#backdoor
Cybersecurity Professionals Push Their Organizations Toward Vendor Consolidation and Product Integration

New global study from ESG and ISSA reveals nearly half of organizations are consolidating or plan on consolidating the number of vendors they do business with

Lax Security Fuels Massive 8220 Gang Botnet Army Surge

The threat group 8220 Gang's cryptocurrency miner and botnet reach has exploded to 30,000 global hosts, a notable increase over the past month, researchers say.

'AIG' Threat Group Launches With Unique Business Model

The rapidly growing Atlas Intelligence Group relies on cyber-mercenaries to carry out its missions.

Feds Recoup $500K From Maui Ransomware Gang

Law enforcement hopes that retuning ransom payments to impacted businesses will demonstrate that working with the feds following a cybersecurity breach is "good business."

Mutare Voice Network Threat Survey Shows Nearly Half of Organizations Experienced Vishing or Social Engineering Attacks in Past Year

Unsecured voice traffic, skyrocketing adoption of Teams-centric enterprise collaboration tools widen enterprise cybersecurity gaps and increase risk of breach.

What InfoSec Pros Can Teach the Organization About ESG

Security pros' experience with transparency and evaluating third-party partners positions them to act as key environmental, social, and governance advisers.

Chaotic LAPSUS$ Group Goes Quiet, but Threat Likely Persists

The LAPSUS$ group emerged with a big splash at the end of 2021, targeting companies, including Okta, with a "reckless and disruptive" approach to hacking.

How to Mitigate the Risk of Karakurt Data Extortion Group's Tactics, Techniques, and Procedures

The group has become the new face of ransomware, taking advantage of vulnerabilities and poor encryption.