Cyber Security News

Infostealer Attacks Surge 84% Weekly Through Phishing EmailsInfostealer Attacks Surge 84% Weekly Through Phishing Emails

Infostealer Attacks Surge 84% Weekly Through Phishing Emails

The volume of infostealer malware distributed through phishing emails has surged by 84% week-on-week in 2024, according to the latest…

7 hours ago
North Korean IT Workers Use Real-Time Deepfakes to Infiltrate Organizations Through Remote JobsNorth Korean IT Workers Use Real-Time Deepfakes to Infiltrate Organizations Through Remote Jobs

North Korean IT Workers Use Real-Time Deepfakes to Infiltrate Organizations Through Remote Jobs

A division of Palo Alto Networks, have revealed a sophisticated scheme by North Korean IT workers to infiltrate organizations globally…

7 hours ago
New Phishing Technique Hides Weaponized HTML Files Within SVG ImagesNew Phishing Technique Hides Weaponized HTML Files Within SVG Images

New Phishing Technique Hides Weaponized HTML Files Within SVG Images

Cybersecurity experts have observed an alarming increase in the use of SVG (Scalable Vector Graphics) files for phishing attacks. These…

7 hours ago
Detecting And Blocking DNS Tunneling Techniques Using Network AnalyticsDetecting And Blocking DNS Tunneling Techniques Using Network Analytics

Detecting And Blocking DNS Tunneling Techniques Using Network Analytics

DNS tunneling is a covert technique that cybercriminals use to bypass traditional network security measures and exfiltrate data or establish…

7 hours ago
Akira Ransomware Launches New Cyberattacks Using Stolen Credentials and Public ToolsAkira Ransomware Launches New Cyberattacks Using Stolen Credentials and Public Tools

Akira Ransomware Launches New Cyberattacks Using Stolen Credentials and Public Tools

The Akira ransomware group has intensified its operations, targeting over 350 organizations and claiming approximately $42 million USD in ransom…

7 hours ago
Hackers Exploit Stolen Certificates and Private Keys to Breach OrganizationsHackers Exploit Stolen Certificates and Private Keys to Breach Organizations

Hackers Exploit Stolen Certificates and Private Keys to Breach Organizations

Recent research has unveiled a concerning vulnerability within the realm of containerized applications, where threat actors are leveraging stolen certificates…

10 hours ago
VibeScamming: Hackers Leverage AI to Craft Phishing Schemes and Functional Attack ModelsVibeScamming: Hackers Leverage AI to Craft Phishing Schemes and Functional Attack Models

VibeScamming: Hackers Leverage AI to Craft Phishing Schemes and Functional Attack Models

Cybersecurity researchers at Guardio Labs have unveiled a troubling new trend dubbed "VibeScamming," where cybercriminals are using AI tools to…

10 hours ago
Ransomware Attacks Cost Banks $6.08 Million on Average, Triggering Downtime and Reputation DamageRansomware Attacks Cost Banks $6.08 Million on Average, Triggering Downtime and Reputation Damage

Ransomware Attacks Cost Banks $6.08 Million on Average, Triggering Downtime and Reputation Damage

In an era where cybersecurity has become paramount, the banking and financial sectors are facing an alarming escalation in ransomware…

10 hours ago
Cybercriminals Deploy FOG Ransomware Disguised as DOGE via Malicious EmailsCybercriminals Deploy FOG Ransomware Disguised as DOGE via Malicious Emails

Cybercriminals Deploy FOG Ransomware Disguised as DOGE via Malicious Emails

A new variant of the FOG ransomware has been identified, with attackers exploiting the name of the Department of Government…

10 hours ago
RedGolf Hackers Linked to Fortinet Zero-Day Exploits and Cyber Attack ToolsRedGolf Hackers Linked to Fortinet Zero-Day Exploits and Cyber Attack Tools

RedGolf Hackers Linked to Fortinet Zero-Day Exploits and Cyber Attack Tools

Security researchers have linked the notorious RedGolf hacking group to a wave of exploits targeting Fortinet firewall zero-days and the…

11 hours ago