Source
DARKReading
Our adversaries certainly have diversity — so cybersecurity teams need it, too.
As cybersecurity's cat-and-mouse game starts to look more like Tom and Jerry, attackers develop a method for undermining Android app security with no obvious fix.
The China-nexus cyber-threat actor has been operating since at least 2019 and has notched victims in multiple countries.
The high-severity CVE-2024-5806 allows cyberattackers to authenticate to the file-transfer platform as any valid user, with accompanying privileges.
More than 200 regional and national government agencies have been impacted by the ransomware attack, and few of them are once again operational.
An unknown adversary compromised a CISA app containing the data via a vulnerability in the Ivanti Connect Secure appliance this January.
Injected malicious JavaScript code gives attackers administrator rights on websites, and fills sites with SEO spam.
Knowledge institutions with legacy infrastructure, limited resources, and digitized intellectual property must protect themselves from sophisticated and destructive cyberattacks.
For a while, the botnet spread but did essentially nothing. All the malicious payloads came well after.
In the latest breaches, threat groups compromised telecommunications firms in at least two Asian nations, installing backdoors and possibly eavesdropping or pre-positioning for a future attack.