The Cyber Express

New Russian Threat Group Hacks Into U.S. Oil and Gas Facilities

Sector 16 claimed sole responsibility for hacking into the control systems of a U.S. oil and gas production facility, and released a video “purportedly demonstrating their access to the facility’s operational data and systems,” Cyble said.

DeepSeek’s Popularity Sparks Surge in Crypto Phishing and Malware Campaigns

Following the DeepSeek’s rapid popularity, a concerning trend has emerged. Cybercriminals have begun to exploit its growing recognition to launch scams and malware campaigns.

HeptaX Cyberespionage Campaign Snoops Through Unauthorized RDP Connections

The attackers heavily rely on PowerShell and BAT scripts to download additional payloads and create an administrative user account on compromised systems, lowering authentication barriers for unauthorized remote access.

Fake WordPress Plugins on 6,000 Sites Prompt Users to Install Malware

The malware campaign is based on ClickFix fake browser update malware and has infected over 6,000 sites since June 2024, totaling over 25,000 sites since August 2023. The hackers are using stolen credentials to install the bogus plugins.

Analyzing a Multi-Stage Malware Attack Targeting Digital Marketing Professionals

The malware primarily targets professionals in digital marketing, e-commerce, and performance marketing sectors, especially those involved in Meta advertising in the US, by crafting deceptive documents tailored to this demographic.

Operation Toy Soldier: U.S. Indicts Russian Hackers for Cyberattacks on Ukrainian Government

The U.S. has indicted members of Russia's GRU Unit 29155 for cyberattacks on Ukraine under Operation Toy Soldier. The indictment charges six individuals, five of whom are military officers, with conspiring to hack into Ukrainian government systems.

Chinese Researchers Break RSA Encryption Using Quantum Computing

Chinese researchers have claimed to successfully break RSA encryption using D-Wave's quantum computing technology, sparking concerns about the security of traditional cryptographic methods.

Cyber Security Bill 2024: Australia’s Strategic Leap Toward a Resilient Digital Ecosystem

Notable features of the law include mandatory cybersecurity standards for Internet of Things (IoT) devices and mandatory ransomware reporting for critical infrastructure entities.

New MisterioLNK Loader Largely Undetected by Security Tools

MisterioLNK leverages Windows script engines to execute malicious payloads while being discreet about downloading files into temporary directories before launching them. It currently has very low detection rates.

Understanding the EigenLayer Hack: A Deep Dive into the $5.7M Theft

The Ethereum restaking protocol EigenLayer experienced a security breach resulting in the theft of tokens. Suspicious selling activities from a specific wallet address triggered alarms within the crypto community.

Defend Against Threats with Cyber Fusion

Cyware is the leading provider of cyber fusion solutions that power threat intelligence sharing , end-to-end automation and 360-degree threat response.

Trending Tags