OWASP Reshuffles Its Top 10 List, Adds New Categories

The Open Web Application Security Project reshuffles its list of top threats, putting broken access controls and cryptographic failures at the top and creating three new risk categories.

SSID Stripping: New Method for Tricking Users Into Connecting to Rogue APs

A team of researchers has identified what appears to be a new method that malicious actors could use to trick users into connecting to their wireless access points (APs).

The state of ransomware: national emergencies and million-dollar blackmail

Ransomware has become one of the most well-known and prevalent threats against the enterprise today. This year alone, we have seen high-profile cases of ransomware infection cause everything from business disruption to fuel shortages.

Researchers Unearth Logic Bomb Attack in Python Package Index (PyPI)

The researchers found six malicious payloads, all uploaded by a single user. The attacker designed them to run during a package’s installation. People have collectively downloaded these payloads around 5,000 times.

Linux Implementation of Cobalt Strike Beacon Targeting Organizations Worldwide

Researchers took the wraps off a newly discovered Linux and Windows re-implementation of Cobalt Strike Beacon that's actively set its sights on government, telecommunications, information technology, and financial institutions in the wild.

FTC warns of extortionists targeting LGBTQ+ community on dating apps

FTC has revealed that the cybercriminals would pose as potential romantic partners on LGBTQ+ dating apps, sending explicit photos and asking their targets to reciprocate.

Sodinokibi Ransomware through the Lens of IR and Collaborative Threat Intelligence

Sodinokibi Ransomware through the Lens of IR and Collaborative Threat Intelligence - Cybersecurity news - Threat Intel & Info Sharing
Security analysts have used Incident Response (IR) and shared intelligence together for analyzing Sodinokibi ransomware’s behavior and offered a similar collaborative approach to counter threats. IBM researchers have assorted Sodinokibi TTPs from many of its attacks and laid bare its activities in ... Read More

Spook.js – New side-channel attack can bypass Google Chrome’s protections against Spectre-style exploits

A newly discovered side-channel attack targeting Google Chrome can allow an attacker to overcome the web browser’s security defenses to retrieve sensitive information using a Spectre-style attack.

BladeHawk Attackers Target Kurds with Android Apps

BladeHawk attackers have been targeting the Kurdish ethnic group for more than a year through a Facebook-based spyware campaign that disguises backdoors in legitimate Android apps, researchers have found.

Pro-Chinese government propaganda campaign spurs on COVID-19 protests in the US

Researchers are tracking a campaign that is both promoting the Chinese government and encouraging real-world protests surrounding the COVID-19 pandemic in the United States.

Defend Against Threats with Cyber Fusion

Cyware is the leading provider of cyber fusion solutions that power threat intelligence sharing , end-to-end automation and 360-degree threat response.

Trending Tags