MITRE Compiled a List of the 25 Most Dangerous Bugs
MITRE specialists have published a list of the 25 most dangerous bugs in software over the past two years. It included a variety of shortcomings, including vulnerabilities and errors in…
The Number of Companies Affected by Attacks on Vulnerabilities in MOVEit Transfer Increased
The consequences of exploiting a 0-day vulnerability in MOVEit Transfer's file transfer management solution continue to spread. The total number of affected companies has already exceeded 100, and Siemens Energy…
8Base Ransomware Group On The Rise, Lists a Number of Victims
In June of this year, a new wave of cyber-attacks and extortion operations, organized by the criminal group 8Base, swept the world. Hackers use a double extortion method: they infect…
PindOS JavaScript Dropper Distributes Bumblebee and IcedID Malware
Deep Instinct specialists spoke about a new JavaScript dropper called PindOS (such a “self-name” was found in the malware code and, based on slang signs, it can be assumed that…
Chinese Hackers Accidentally Infected European Hospital with Malware
Check Point analysts found that Chinese hackers in a chain of accidents infected an unnamed European hospital with malware. Researchers attribute this to the uncontrolled spread of malware that is…
Super Mario Malware: Hackers Spread Stealers in the Fake Game
The Super Mario video game franchise has gained immense acclaim due to its platforming gameplay, lively visuals, memorable characters. Recently, the franchise has experienced a renewed surge in popularity with…
LastPass Users Can’t Login to App after Resetting MFA
Since May 2023, users of the LastPass password manager have been experiencing severe login issues after resetting their MFA. It all started when people were asked to reset multi-factor authentication…
RepoJacking Attacks Could Threaten Millions of GitHub Repositories
Aqua researchers believe that millions of repositories on GitHub are vulnerable to an attack that allows taking over other people's repositories and is called RepoJacking. The issue is reportedly affecting…
Condi Malware Builds a Botnet from TP-Link Routers
In May 2023, a new Condi malware, focused on DDoS for hire, appeared. It builds a botnet and conducts attacks using vulnerabilities in TP-Link Archer AX21 (AX1800) Wi-Fi routers. Fortinet…
Over 100k ChatGPT Accounts Are For Sale on the Darknet
According to a new report, over the past year, over 100k ChatGPT users' accounts have been compromised using malware to steal information. India was in first place for the number…
How Can Companies Be Secure Against Cyberattacks?
Organizations face an alarming reality in the digital world: data breaches and cyberattacks are becoming more frequent. Cybercriminals find more opportunities to exploit vulnerabilities as reliance on technology grows, and…
APT28 Attacked Ukrainian and Polish Organizations
Recorded Future, in collaboration with CERT-UA researchers, has unveiled a recent cyber offensive orchestrated by Russian-speaking hackers affiliated with the APT28 Group (also known as Fancy Bear, BlueDelta, Sednit, and…