Tag: Threat Actors
-
Threat Actors Game GitHub Search to Spread Malware
Threat actors are going to great lengths to ensure that malicious code hidden in legitimate-looking GitHub repositories is used by as many …
-
Threat Actors Deliver Malware via YouTube Video Game Cracks
Threat actors target home users with information-stealing malware like Vidar, StealC, and Lumma Stealer, which disguises the malware as …
-
Chinese Threat Actors Concealed in US Infrastructure Networks
According to a joint alert from CISA, the NSA, the FBI, and partner Five Eyes organizations, the Chinese cyberespionage group Volt Typhoon …
-
Threat Actors Leverage TeamViewer in Ransomware Attacks
Threat actors are leveraging TeamViewer to gain initial access to the endpoints of organizations and attempt to deploy encryptors based on …
-
Threat Actors Increasingly Abusing GitHub for Malicious Purposes
The ubiquity of GitHub in information technology (IT) environments has made it a lucrative choice for threat actors to host and deliver …
-
CISA: Adobe ColdFusion flaw leveraged to access government servers (CVE-2023-26360)
Unknown attackers have leveraged a critical vulnerability (CVE-2023-26360) in the Adobe ColdFusion application development platform to …
-
Ducktail Infostealer, DarkGate RAT Linked to Same Threat Actors
Cybersecurity researchers have uncovered a connection between the notorious DarkGate remote access trojan (RAT) and the Vietnam-based …
-
Qakbot Threat Actors Deliver Knight Ransomware and Remcos through Weaponized LNK Files
Talos researchers moderately believe Qakbot threat actors remain active, launching a recent campaign with Cyclops/Ransom Knight ransomware …
-
Warning: RocketMQ Vulnerability Actively Exploited by Threat Actors
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds a new critical-severity vulnerability to its KEV …
-
Sourcegraph’s Website Breached by Threat Actors
Popular AI-powered coding platform Sourcegraph reveals that its website was breached this week due to a leaked site-admin access token. The …
-
Attack Dwell Times Fall but Threat Actors Are Moving Faster
The dwell time of cyber-attacks fell to a median of eight days in the first half of 2023, but attackers are moving faster to make the most …
-
Patch Against Exploit Kits. Understanding How Threat Actors Target Your Defenses
Exploit kits (Eks) are collections of exploits – pieces of code or sequences of commands – created to leverage vulnerabilities in …
●●●