Security News

What the Latest Ransomware Attacks Teach About Defending Networks
2024-03-21 14:02

Here's a lowdown on some recent ransomware attacks, lessons worth learning from them, and tips to help limit ransomware risk. Ransomware attacks have knock-on financial impacts when companies need to swiftly shut down systems that might form the backbone of their normal operations.

Making Sense of Operational Technology Attacks: The Past, Present, and Future
2024-03-21 09:23

When you read reports about cyber-attacks affecting operational technology (OT), it’s easy to get caught up in the hype and assume every single one is sophisticated. But are OT environments all...

New ‘Loop DoS’ attack may impact up to 300,000 online systems
2024-03-20 19:40

A new denial-of-service attack dubbed 'Loop DoS' targeting application layer protocols can pair network services into an indefinite communication loop that creates large volumes of traffic. The attack is possible due to a vulnerability, currently tracked as CVE-2024-2169, in the implementation of the UDP protocol, which is susceptible to IP spoofing and does not provide sufficient packet verification.

New 'Loop DoS' Attack Impacts Hundreds of Thousands of Systems
2024-03-20 14:51

A novel denial-of-service (DoS) attack vector has been found to target application-layer protocols based on User Datagram Protocol (UDP), putting hundreds of thousands of hosts likely at risk....

TeamCity Flaw Leads to Surge in Ransomware, Cryptomining, and RAT Attacks
2024-03-20 11:26

Multiple threat actors are exploiting the recently disclosed security flaws in JetBrains TeamCity software to deploy ransomware, cryptocurrency miners, Cobalt Strike beacons, and a Golang-based...

Growing AceCryptor attacks in Europe
2024-03-20 11:00

ESET Research has recorded a considerable increase in AceCryptor attacks, with detections tripling between the first and second halves of 2023. In recent months, researchers registered a significant change in how AceCryptor is used, namely that the attackers spreading Rescoms started utilizing AceCryptor, which was not the case beforehand.

New BunnyLoader Malware Variant Surfaces with Modular Attack Features
2024-03-20 09:43

Cybersecurity researchers have discovered an updated variant of a stealer and malware loader called BunnyLoader that modularizes its various functions as well as allow it to evade detection....

Quick Glossary: Cybersecurity Attack Response and Mitigation
2024-03-19 16:00

This quick glossary, created by Mark W. Kaelin for TechRepublic Premium, explains the terminology used by security experts as they attempt to reduce the damage caused by a successful attack. Evidence may include documents, logs, software or hardware.

From Deepfakes to Malware: AI's Expanding Role in Cyber Attacks
2024-03-19 13:55

Large language models (LLMs) powering artificial intelligence (AI) tools today could be exploited to develop self-augmenting malware capable of bypassing YARA rules. "Generative AI can be used to...

Hackers Exploiting Popular Document Publishing Sites for Phishing Attacks
2024-03-19 10:32

Threat actors are leveraging digital document publishing (DDP) sites hosted on platforms like FlipSnack, Issuu, Marq, Publuu, RelayTo, and Simplebooklet for carrying out phishing, credential...