Security News > 2024 > May

Moroccan Cybercrime Group Steals Up to $100K Daily Through Gift Card Fraud
2024-05-27 12:12

Microsoft is calling attention to a Morocco-based cybercrime group dubbed Storm-0539 that's behind gift card fraud and theft through highly sophisticated email and SMS phishing attacks. "Their...

Report: The Dark Side of Phishing Protection
2024-05-27 11:46

The transition to the cloud, poor password hygiene and the evolution in webpage technologies have all enabled the rise in phishing attacks. But despite sincere efforts by security stakeholders to...

New Tricks in the Phishing Playbook: Cloudflare Workers, HTML Smuggling, GenAI
2024-05-27 09:02

Cybersecurity researchers are alerting of phishing campaigns that abuse Cloudflare Workers to serve phishing sites that are used to harvest users' credentials associated with Microsoft, Gmail,...

Pakistan-linked Hackers Deploy Python, Golang, and Rust Malware on Indian Targets
2024-05-27 06:31

The Pakistan-nexus Transparent Tribe actor has been linked to a new set of attacks targeting Indian government, defense, and aerospace sectors using cross-platform malware written in Python,...

Human error still perceived as the Achilles’ heel of cybersecurity
2024-05-27 04:30

While fears of cyber attacks continue to rise, CISOs demonstrate increasing confidence in their ability to defend against these threats, reflecting a significant shift in the cybersecurity landscape, according to Proofpoint. Human error continues to be perceived as the Achilles' heel of cybersecurity, with 74% of CISOs identifying it as the most significant vulnerability.

Chronon: Open-source data platform for AI/ML applications
2024-05-27 04:00

Chronon is an open-source, end-to-end feature platform designed for machine learning teams to build, deploy, manage, and monitor data pipelines for machine learning. Chronon enables you to harness all the data within your organization, including batch tables, event streams, and services, to drive your AI/ML projects without the need to manage the typically required orchestration.

Digital ID adoption: Implementation and security concerns
2024-05-27 03:30

As digital transformation accelerates, understanding how businesses are preparing for and implementing digital ID technologies is crucial for staying ahead in security and efficiency, according to Regula. A digital ID is an online representation of an individual containing personal information, credentials, and attributes used to establish and authenticate identity in digital spaces.

Ransomware operators shift tactics as law enforcement disruptions increase
2024-05-27 03:00

Ransomware remains one of the most pressing cybersecurity threats in 2024, with attackers continually evolving their methods to maximize impact and evade detection. In this Help Net Security round-up, we present excerpts from previously recorded videos featuring cybersecurity experts discussing ransomware-related topics such as payment practices, the recent surge in ransomware attacks, and more.

Bayer and 12 other major drug companies caught up in Cencora data loss
2024-05-27 02:59

Your profile can be used to present content that appears more relevant based on your possible interests, such as by adapting the order in which content is shown to you, so that it is even easier for you to find content that matches your interests. Content presented to you on this service can be based on your content personalisation profiles, which can reflect your activity on this or other services, possible interests and personal aspects.

Hackers phish finance orgs using trojanized Minesweeper clone
2024-05-26 14:16

Hackers are utilizing code from a Python clone of Microsoft's venerable Minesweeper game to hide malicious scripts in attacks on European and US financial organizations. Ukraine's CSIRT-NBU and CERT-UA attribute the attacks to a threat actor tracked as 'UAC-0188,' who is using the legitimate code to hide Python scripts that download and install the SuperOps RMM. Superops RMM is a legitimate remote management software that gives remote actors direct access to the compromised systems.