In mid-May 2023, TA453 - also known publicly as Charming Kitten, APT42, Mint Sandstorm, Yellow Garuda - sent a benign conversation lure masquerading as a senior fellow with the Royal United Services Institute (RUSI) to the public media contact for a nuclear security expert at a US-based think tank focused on foreign affairs. The email solicited feedback on a project called “Iran in the Global Security Context” and requested permission to send a draft for review. The initial email also mentione
All Articles (2784)
ZooTampa revealed it recently discovered a “cybersecurity incident” targeting its network environment. The zoo told local media it took immediate proactive security measures to mitigate the impact. “Upon detecting the incident, the Zoo took swift action and promptly engaged third-party forensic specialists to assist us with securing the network environment and investigate the extent of the unauthorized activity,” the zoo said in a statement.[1]
ZooTampa said it is also working with federal law
The US Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigation (FBI), the Multi-State Information Sharing and Analysis Center (MS-ISAC), and the Canadian Centre for Cyber Security (CCCS) released a joint cybersecurity advisory (CSA) regarding new Truebot malware variants that are being used against organizations in the United States and Canada.
Older versions of the Truebot malware variant were delivered via malicious phishing email attachments, the CSA expla
The newly discovered Chinese nation-state actor known as Volt Typhoon has been observed to be active in the wild since at least mid-2020, with the hacking crew linked to never-before-seen tradecraft to retain remote access to targets of interest. The adversary consistently employed ManageEngine Self-service Plus exploits to gain initial access, followed by custom web shells for persistent access and Living-off-the-Land (LotL) techniques for lateral movement. Another name for this threat is Van
Black Basta ransomware has made headlines for allegedly compromising high-profile European and North American organizations across a variety of industries, such as outsourcing, technology, and manufacturing. The history of Black Basta ransomware dates to at least April 2022, with a professional organizations company in the United States being one of its first victims. Since then, Black Basta has slowly expanded their operations, with the group allegedly compromising and stealing data from a US
A security alert was issued last Friday after a cyber-attack on the Election Commission of Pakistan (ECP). The electoral watchdog has urged all employees to take the necessary precautions in the wake of the situation. All ECP staff were ordered not to open emails which could possibly lead to precious data being leaked. The letter dated 6 July, titled “Cyber Security Alert” and written by the ECP Information Security Specialist who shared a screengrab of an email sent to an ECP official that a
If you have ever owned a domain name, the chances are good that at some point you have received a snail mail letter which appears to be a bill for a domain or website-related services. These misleading missives try to trick people into paying for useless services they never ordered, don’t need, and probably will never receive. Below, Krebs takes a look at the most recent details of this scam, DomainNetworks, and some clues about who may be behind it.
The DomainNetworks mailer may reference a d
Multiple vulnerabilities have been discovered in Google Android OS, the most severe of which could allow for remote code execution. Android is an operating system developed by Google for mobile devices, including, but not limited to, smartphones, tablets, and watches. Successful exploitation of the most severe of these vulnerabilities could allow for privilege escalation. Depending on the privileges associated with the exploited component, an attacker could then install programs; view, change,
Nickelodeon is respected by millions across the globe, but rumors are circulating on the Internet suggesting this popular children’s entertainment network has fallen victim to a significant data breach or leak. According to several Internet forums and tweets, approximately 500GB of data, including unreleased television shows, scripts, and other materials, have been compromised. Reportedly, Nickelodeon’s legal team has taken swift action, aggressively pursuing Digital Millennium Copyright Act (
EU Health Sector: Ransomware Accounts for 54% of Cybersecurity Threats
The European Union Agency for Cybersecurity (ENISA) released a report on 5 July with its first cyber threat landscape for the health sector. The report found that ransomware accounts for 54% of cybersecurity threats in the health sector.
The comprehensive analysis maps and studies cyberattacks, identifying prime threats, actors, impacts, and trends for a period of over 2 years, providing valuable insights for the healthcare
A new bill proposes to increase cybersecurity funding for rural water systems by $7.5 million dollars per year. It is not a lot of money for part of the critical infrastructure and is an insult to all taxpayers living in rural areas. The EPA budget for 2023 is nearly $12 billion. The bill was announced on 05 June 2023. “Congressman Don Davis (NC-01), along with Representatives Zachary Nunn (IA-03), Angie Craig (MN-02), and Abigail Spanberger (VA-07), members of the US House Committee on Agri
A new process injection technique named Mockingjay, not to be confused with the 2010 science fiction novel by Suzanne Collins which is part of The Hunger Games series, could be exploited by threat actors to bypass security solutions to execute malicious code on compromised systems. Unlike traditional methods, Mockingjay leverages legitimate DLLs with RWX (read, write, execute) sections to evade EDR hooks and inject code into remote processes.[1]
Process injection involves executing arbitrary co
Poor Canada is currently in the cross-hairs of hackers who are causing havoc with the Canadian driving public. Motorists who have pulled up to one of Canada’s Petro-Canada gas stations in the last few days have been greeted by “cash only” signs, as a cyber-attack on parent company Suncor Energy has disrupted the company’s payment and loyalty reward systems.
Red Sky Alliance recently highlighted this attack back when it began: https://redskyalliance.org/intel-reports/intelligence-report-weekly-d
For the first time, IBM https://www.ibm.com has used a quantum computer to solve a problem that eludes the leading classical methods. This accomplishment marks a significant milestone toward useful quantum computing systems and software.
IBM has published a paper in Nature, https://www.nature.com/articles/s42254-021-00410-6, that describes a breakthrough in Quantum computing wherein they solved a complex problem that leading supercomputing approximation methods could not handle. This achiev
After years of coercive laws and acts that were enforced against the American colonists of England, the British sent military troops to better enforce their laws. On 18 and 19 April 1775, the British General Thomas Gage led a force of British soldiers from Boston to Lexington, where he planned to capture colonial radical leaders Sam Adams and John Hancock, and then head to Concord and seize their gunpowder. But American spies got wind of the plan, and with the help of riders such as Paul Rever
Submarine cables, the backbone network of the global economy and telecommunications, are operating in an increasingly risky environment and are prone to geopolitical, physical, and cyber threats, including nation-state sabotage and spying. Fiber-optic submarine cables on the ocean floor transmit an estimated 99% of all intercontinental internet traffic and communications, including roughly $10 trillion of financial transactions daily and sensitive government and military communication, making t
Japan has confirmed balloons have flown over its territory and said it's prepared to shoot them down in future. China has not directly addressed the evidence presented by the BBC. US - China relations were thrown into turmoil earlier this year when an alleged Chinese spy balloon was shot down off the US coast.
See: https://redskyalliance.org/xindustry/the-chinese-balloon-not-a-good-sign
China claimed the balloon seen over north-western US in late January was a civilian airship, used for scien
Exploit and vulnerability intelligence provider VulnCheck https://vulncheck.com has issued a warning over fake security researcher accounts distributing malware disguised as zero-day exploits for popular software. The campaign was discovered in early May 2023, when researchers found a GitHub repository hosting code that its author claimed to be a zero-day for the Signal messaging application. The cybersecurity firm continued finding such accounts on GitHub, offering what they claimed to be z
A common tactic for cybercriminals is to distribute storage drives, phones, or other internet-connected devices filled with hidden malware to hack victims and steal their information. Although smartwatches have not been known for major security breaches so far, they carry many of the same vulnerabilities as other IoT products and warrant a similar degree of caution. A recent InfraGard brief by DHS cautioned the use of Smartphones and being vulnerable to malware.
The US Army’s Criminal Investiga
In today's digital world, automation is becoming increasingly widespread, giving rise to the prominence of bots. Bots are highly versatile software programs designed to automate tasks and streamline processes. While they offer convenience and efficiency, we must recognize the potential for misuse.
Over the past few years, bots have emerged as a new cybersecurity threat, as they can be manipulated for malicious purposes. This article will explore the realm of malicious bots, uncover their cyberse