Search

Showing 1520 results for: "worm".

Evolving Raspberry Robin IAB operations uncovered
More than 180 unique command-and-control domains have been leveraged in attacks by the Raspberry Robin threat operation, also known as Storm-0856 and Roshtyak, indicating its evolution from a Windows worm to an initial access broker, The Hacker News reports. Despite having been utilized to f...
Ransomware spike driven by RaaS operations
Ransomware intrusions totaled 432 in December, which was slightly lower than the peak figure in August but nearly four times higher than the number of incidents in January, despite other high-severity threats holding steady throughout 2024, according to Cyber Daily. Mounting ransomware inci...
AI makes the dark web even darker
COMMENTARY: All we hear all day everyday is the greatness of AI. We hear about its promise to revolutionize countless industries, from healthcare to education and scientific research. What we hear less: how it’s quickly becoming a powerful weapon in the arsenal of cybercriminals. Specifically, A...
The future of identity security: What we can expect
Identity security will see several ongoing long-term trends continue over the next few years. These include greater adoption of phishing-resistant authentication; greater acceptance of passkeys and other passwordless protocols; further migration to cloud-native identity-management platforms; and ac...
GhostGPT offers AI coding, phishing assistance for cybercriminals
A generative AI (GenAI) tool called GhostGPT is being offered to cybercriminals for help with writing malware code and phishing emails, Abnormal Security reported in a blog post Thursday. GhostGPT is marketed as an “uncensored AI” and is likely a wrapper for a jailbroken version of ChatGPT or an...
New expansive TeamTNT attack campaign detailed
New cloud attacks have been launched by the TeamTNT cryptojacking operation as part of its new Docker Gatling Gun campaign, The Hacker News reports. After being targeted through masscan and ZGrab, unauthenticated Docker API endpoints have been exploited by TeamTNT to facilita...
GoldenJackal threat group targets air-gapped government systems
A new attack is targeting networks with air-gapped machines. Researchers with ESET uncovered a threat actor dubbed “GoldenJackal” that is using a malware infection specifically designed to target air-gapped machines: PCs that are deliberately set up to run without any network or internet connect...
BlackByte ransomware group targets VMware ESXi bug
The BlackByte ransomware group was observed exploiting a recent authentication bypass vulnerability in VMware ESXi, a technique that departs from the group’s established tradecraft. Researchers at the Cisco Talos Incident Response team said in an Aug. 28 blog post that BlackByte — believed to be...
Why security awareness training needs to modernize
Despite increased investments in security training, successful email attacks are on the rise. In fact, business email compromise (BEC) attacks increased by 108% between 2022 and 2023 alone. So why isn’t security awareness preventing more incidents? Unfortunately, traditional security educati...

You can skip this ad in 5 seconds