Skip to content
information security Page 156

information security

Telegram Marketplaces Fuel Phishing Attacks with Easy-to-Use Kits and Malware

Telegram Marketplaces Fuel Phishing Attacks with Easy-to-Use Kits and Malware

?Jan 31, 2024?NewsroomCyber Crime / Hacking News Cybersecurity researchers are calling attention to the “democratization” of the phishing ecosystem owing to the emergence of Telegram as an epicenter for cybercrime, enabling threat actors to mount… 

Italian Businesses Hit by Weaponized USBs Spreading Cryptojacking Malware

Italian Businesses Hit by Weaponized USBs Spreading Cryptojacking Malware

?Jan 31, 2024?NewsroomCryptocurrency / Cybersecurity A financially motivated threat actor known as UNC4990 is leveraging weaponized USB devices as an initial infection vector to target organizations in Italy. Google-owned Mandiant said the attacks single out… 

Chinese Hackers Exploiting VPN Flaws to Deploy KrustyLoader Malware

Chinese Hackers Exploiting VPN Flaws to Deploy KrustyLoader Malware

?Jan 31, 2024?NewsroomCyber Attack / Network Security A pair of recently disclosed zero-day flaws in Ivanti Connect Secure (ICS) virtual private network (VPN) devices have been exploited to deliver a Rust-based payload called KrustyLoader that’s… 

URGENT: Upgrade GitLab – Critical Workspace Creation Flaw Allows File Overwrite

URGENT: Upgrade GitLab – Critical Workspace Creation Flaw Allows File Overwrite

?Jan 30, 2024?NewsroomDevSecOps / Vulnerability GitLab once again released fixes to address a critical security flaw in its Community Edition (CE) and Enterprise Edition (EE) that could be exploited to write arbitrary files while creating… 

China-Linked Hackers Target Myanmar’s Top Ministries with Backdoor Blitz

China-Linked Hackers Target Myanmar’s Top Ministries with Backdoor Blitz

?Jan 30, 2024?NewsroomMalware / Cyber Espionage The China-based threat actor known as Mustang Panda is suspected to have targeted Myanmar’s Ministry of Defence and Foreign Affairs as part of twin campaigns designed to deploy backdoors…