CISA and FBI Warn of Ghost Ransomware Which has Breached Organizations in 70 Countries

Names linked to this group include Ghost, Cring, Crypt3r, Phantom, Strike, Hello, Wickrme, HsHarada, and Rapture, with ransomware samples used in their attacks including Cring.exe, Ghost.exe, ElysiumO.exe, and Locker.exe.

Proof-of-Concept Exploit Released for Four Ivanti Vulnerabilities

Horizon3.ai researchers on Wednesday released technical details and a proof-of-concept (PoC) exploit for four critical Ivanti vulnerabilities that were first disclosed and patched last month.

The Bleeding Edge of Phishing: darcula-suite 3.0 Enables DIY Phishing of Any Brand

A new version of the phishing-as-a-service (PhaaS) platform "Darcula" is launching, with a feature that allows anyone to spoof any brand online, with no technical skill required.

Over 330 Million Credentials Compromised by Infostealers

Infostealers became one of the “most significant initial access vectors” in the threat landscape last year, with one threat intelligence company claiming to find over 330 million compromised credentials linked to the malware.

Darcula PhaaS can now auto-generate phishing kits for any brand

The Darcula phishing-as-a-service (PhaaS) platform is preparing to release its third major version, with one of the highlighted features, the ability to create do-it-yourself phishing kits to target any brand.

Two critical vulns lead to stolen MongoDB data, RCE

Security sleuths found two critical vulnerabilities in a third-party library that MongoDB relies on, which means bad guys can potentially steal data and run code. Mongoose also has two critical security flaws.

Fake Chrome Update Delivers DriverEasy Malware by Abusing Dropbox

A recent investigation has uncovered a malicious application, DriverEasy, masquerading as a legitimate Google Chrome update to steal user credentials.The malware leverages Dropbox’s API to exfiltrate sensitive information.

Stately Taurus Activity in Southeast Asia Links to Bookworm Malware

While analyzing infrastructure related to Stately Taurus activity targeting organizations in countries affiliated with ASEAN, Unit 42 researchers observed overlaps with infrastructure used by a variant of the Bookworm malware.

DeceptiveDevelopment targets freelance developers

North Korea-aligned cybercriminals, known as DeceptiveDevelopment, have been targeting freelance software developers with fake job offers to steal cryptocurrency wallets and login information.

Sophisticated Payment Card Skimming Campaign Conceals Itself by Leveraging Stripe API

The attack employs an innovative technique that exploits Stripe’s deprecated API to verify card details before exfiltration – ensuring only valid payment information is harvested while maintaining a seamless customer experience that evades detection.

Defend Against Threats with Cyber Fusion

Cyware is the leading provider of cyber fusion solutions that power threat intelligence sharing , end-to-end automation and 360-degree threat response.

Trending Tags