All Articles (2242)

Sort by

12143866499?profile=RESIZE_400xThe US Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigation (FBI), the Multi-State Information Sharing and Analysis Center (MS-ISAC), and the Canadian Centre for Cyber Security (CCCS) released a joint cybersecurity advisory (CSA) regarding new Truebot malware variants that are being used against organizations in the United States and Canada.

Older versions of the Truebot malware variant were delivered via malicious phishing email attachments, the CSA expla

12143742292?profile=RESIZE_400xThe newly discovered Chinese nation-state actor known as Volt Typhoon has been observed to be active in the wild since at least mid-2020, with the hacking crew linked to never-before-seen tradecraft to retain remote access to targets of interest.  The adversary consistently employed ManageEngine Self-service Plus exploits to gain initial access, followed by custom web shells for persistent access and Living-off-the-Land (LotL) techniques for lateral movement.  Another name for this threat is Van

12128290467?profile=RESIZE_400xBlack Basta ransomware has made headlines for allegedly compromising high-profile European and North American organizations across a variety of industries, such as outsourcing, technology, and manufacturing.  The history of Black Basta ransomware dates to at least April 2022, with a professional organizations company in the United States being one of its first victims. Since then, Black Basta has slowly expanded their operations, with the group allegedly compromising and stealing data from a US

12132161479?profile=RESIZE_400xA security alert was issued last Friday after a cyber-attack on the Election Commission of Pakistan (ECP).  The electoral watchdog has urged all employees to take the necessary precautions in the wake of the situation.  All ECP staff were ordered not to open emails which could possibly lead to precious data being leaked.  The letter dated 6 July, titled “Cyber Security Alert” and written by the ECP Information Security Specialist who shared a screengrab of an email sent to an ECP official that a

12131199061?profile=RESIZE_400xIf you have ever owned a domain name, the chances are good that at some point you have received a snail mail letter which appears to be a bill for a domain or website-related services.   These misleading missives try to trick people into paying for useless services they never ordered, don’t need, and probably will never receive. Below, Krebs takes a look at the most recent details of this scam, DomainNetworks, and some clues about who may be behind it.

The DomainNetworks mailer may reference a d

12131314470?profile=RESIZE_192XMultiple vulnerabilities have been discovered in Google Android OS, the most severe of which could allow for remote code execution. Android is an operating system developed by Google for mobile devices, including, but not limited to, smartphones, tablets, and watches.  Successful exploitation of the most severe of these vulnerabilities could allow for privilege escalation.  Depending on the privileges associated with the exploited component, an attacker could then install programs; view, change,

12131169263?profile=RESIZE_400xNickelodeon is respected by millions across the globe, but rumors are circulating on the Internet suggesting this popular children’s entertainment network has fallen victim to a significant data breach or leak.  According to several Internet forums and tweets, approximately 500GB of data, including unreleased television shows, scripts, and other materials, have been compromised.  Reportedly, Nickelodeon’s legal team has taken swift action, aggressively pursuing Digital Millennium Copyright Act (

12130899701?profile=RESIZE_400xEU Health Sector: Ransomware Accounts for 54% of Cybersecurity Threats

The European Union Agency for Cybersecurity (ENISA) released a report on 5 July with its first cyber threat landscape for the health sector.  The report found that ransomware accounts for 54% of cybersecurity threats in the health sector.

The comprehensive analysis maps and studies cyberattacks, identifying prime threats, actors, impacts, and trends for a period of over 2 years, providing valuable insights for the healthcare

12131161886?profile=RESIZE_400xA new bill proposes to increase cybersecurity funding for rural water systems by $7.5 million dollars per year.  It is not a lot of money for part of the critical infrastructure and is an insult to all taxpayers living in rural areas.  The EPA budget for 2023 is nearly $12 billion.  The bill was announced on 05 June 2023.  “Congressman Don Davis (NC-01), along with Representatives Zachary Nunn (IA-03), Angie Craig (MN-02), and Abigail Spanberger (VA-07), members of the US House Committee on Agri

12130779280?profile=RESIZE_400xA new process injection technique named Mockingjay, not to be confused with the 2010 science fiction novel by Suzanne Collins which is part of The Hunger Games series, could be exploited by threat actors to bypass security solutions to execute malicious code on compromised systems.  Unlike traditional methods, Mockingjay leverages legitimate DLLs with RWX (read, write, execute) sections to evade EDR hooks and inject code into remote processes.[1]

Process injection involves executing arbitrary co

12130443653?profile=RESIZE_400xPoor Canada is currently in the cross-hairs of hackers who are causing havoc with the Canadian driving public.  Motorists who have pulled up to one of Canada’s Petro-Canada gas stations in the last few days have been greeted by “cash only” signs, as a cyber-attack on parent company Suncor Energy has disrupted the company’s payment and loyalty reward systems.

Red Sky Alliance recently highlighted this attack back when it began: https://redskyalliance.org/intel-reports/intelligence-report-weekly-d

12130121855?profile=RESIZE_400xFor the first time, IBM   https://www.ibm.com has used a quantum computer to solve a problem that eludes the leading classical methods.  This accomplishment marks a significant milestone toward useful quantum computing systems and software. 

IBM has published a paper in Nature, https://www.nature.com/articles/s42254-021-00410-6, that describes a breakthrough in Quantum computing wherein they solved a complex problem that leading supercomputing approximation methods could not handle.  This achiev

12128557887?profile=RESIZE_400xAfter years of coercive laws and acts that were enforced against the American colonists of England, the British sent military troops to better enforce their laws.  On 18 and 19 April 1775, the British General Thomas Gage led a force of British soldiers from Boston to Lexington, where he planned to capture colonial radical leaders Sam Adams and John Hancock, and then head to Concord and seize their gunpowder.  But American spies got wind of the plan, and with the help of riders such as Paul Rever

12128626882?profile=RESIZE_400xSubmarine cables, the backbone network of the global economy and telecommunications, are operating in an increasingly risky environment and are prone to geopolitical, physical, and cyber threats, including nation-state sabotage and spying.  Fiber-optic submarine cables on the ocean floor transmit an estimated 99% of all intercontinental internet traffic and communications, including roughly $10 trillion of financial transactions daily and sensitive government and military communication, making t

12128562076?profile=RESIZE_400xJapan has confirmed balloons have flown over its territory and said it's prepared to shoot them down in future.  China has not directly addressed the evidence presented by the BBC.  US - China relations were thrown into turmoil earlier this year when an alleged Chinese spy balloon was shot down off the US coast.

See:  https://redskyalliance.org/xindustry/the-chinese-balloon-not-a-good-sign

China claimed the balloon seen over north-western US in late January was a civilian airship, used for scien

12128282279?profile=RESIZE_400xExploit and vulnerability intelligence provider VulnCheck  https://vulncheck.com  has issued a warning over fake security researcher accounts distributing malware disguised as zero-day exploits for popular software.  The campaign was discovered in early May 2023, when researchers found a GitHub repository hosting code that its author claimed to be a zero-day for the Signal messaging application.  The cybersecurity firm continued finding such accounts on GitHub, offering what they claimed to be z

12127855284?profile=RESIZE_400xA common tactic for cybercriminals is to distribute storage drives, phones, or other internet-connected devices filled with hidden malware to hack victims and steal their information. Although smartwatches have not been known for major security breaches so far, they carry many of the same vulnerabilities as other IoT products and warrant a similar degree of caution.  A recent InfraGard brief by DHS cautioned the use of Smartphones and being vulnerable to malware.

The US Army’s Criminal Investiga

12128641272?profile=RESIZE_400xIn today's digital world, automation is becoming increasingly widespread, giving rise to the prominence of bots. Bots are highly versatile software programs designed to automate tasks and streamline processes. While they offer convenience and efficiency, we must recognize the potential for misuse.

Over the past few years, bots have emerged as a new cybersecurity threat, as they can be manipulated for malicious purposes. This article will explore the realm of malicious bots, uncover their cyberse

12127003474?profile=RESIZE_400xThe Office of the Australian Information Commissioner (OAIC) says some of its files were stolen in a ransomware attack on law firm HWL Ebsworth https://hwlebsworth.com.au.

One of the largest law firms in Australia, HWL Ebsworth, says in an incident notice on its website that it became aware of the incident on 28 April 2023, after the ALPHV_BlackCat ransomware gang boasted about the hack, and that it immediately informed the Australian authorities and started investigating the incident.[1]

See: 

12127329479?profile=RESIZE_400xThe Healthcare and Public Health (HPH) sector issued a warning on 22 June regarding SEO Poisoning.  Search engine optimization (SEO) poisoning, considered a type of malvertising (malicious advertising), is a technique used by threat actors to increase the prominence of their malicious websites, making them look more authentic to consumers.  SEO poisoning tricks the human mind, which naturally assumes the top hits are the most credible and is very effective when people fail to look closely at the