cyber2security blog

Hackers infect TP-Link router firmware to attack EU entities
A Chinese state-sponsored hacking group named "Camaro Dragon"…

Russian ransomware affiliate charged with attacks on critical infrastructure
The U.S. Justice Department has filed charges against a Russian…

ScanSource says ransomware attack behind multi-day outages
Technology provider ScanSource has announced it has fallen victim…

Malicious Microsoft VSCode extensions steal passwords, open remote shells
Cybercriminals are starting to target Microsoft's VSCode Marketplace,…

PyPI Repository Under Attack: User Sign-Ups and Package Uploads Temporarily Halted
The maintainers of Python Package Index (PyPI), the official…

FBI confirms BianLian ransomware switch to extortion only attacks
A joint Cybersecurity Advisory from government agencies in the…

Hackers use Azure Serial Console for stealthy access to VMs
A financially motivated cybergang tracked by Mandiant as 'UNC3944'…

New ZIP domains spark debate among cybersecurity experts
Cybersecurity researchers and IT admins have raised concerns…

Meet ‘Jack’ from Romania! Mastermind Behind Golden Chickens Malware
The identity of the second threat actor behind the Golden Chickens malware…

Warning: Samsung Devices Under Attack! New Security Flaw Exposed
The U.S. Cybersecurity and Infrastructure Security Agency (CISA)…

Developer Alert: NPM Packages for Node.js Hiding Dangerous TurkoRat Malware
Two malicious packages discovered in the npm package repository…

WebKit Under Attack: Apple Issues Emergency Patches for 3 New Zero-Day Vulnerabilities
Apple on Thursday rolled out security updates to iOS, iPadOS,…

This Cybercrime Syndicate Pre-Infected Over 8.9 Million Android Phones Worldwide
A cybercrime enterprise known as Lemon Group is leveraging…

Privacy Sandbox Initiative: Google to Phase Out Third-Party Cookies Starting 2024
Google has announced plans to officially flip the switch on its…

Searching for AI Tools? Watch Out for Rogue Sites Distributing RedLine Malware
Malicious Google Search ads for generative AI services like OpenAI…

Notorious Cyber Gang FIN7 Returns With Cl0p Ransomware in New Wave of Attacks
The notorious cybercrime group known as FIN7 has been observed…

How to Reduce Exposure on the Manufacturing Attack Surface
Digitalization initiatives are connecting once-isolated Operational…

Dr. Active Directory vs. Mr. Exposed Attack Surface: Who’ll Win This Fight?
Active Directory (AD) is among the oldest pieces of software…

8220 Gang Exploiting Oracle WebLogic Flaw to Hijack Servers and Mine Cryptocurrency
The notorious cryptojacking group tracked as 8220 Gang has…

Darknet Carding Kingpin Pleads Guilty: Sold Financial Info of Tens of Thousands
A U.S. national has pleaded guilty in a Missouri court to operating…

Apple Thwarts $2 Billion in App Store Fraud, Rejects 1.7 Million App Submissions
Apple has announced that it prevented over $2 billion in potentially…

Critical Flaws in Cisco Small Business Switches Could Allow Remote Attacks
Cisco has released updates to address a set of nine security…

Google will delete accounts inactive for more than 2 years
Google has updated its policy for personal accounts across its…

Escalating China-Taiwan Tensions Fuel Alarming Surge in Cyber Attacks
The rising geopolitical tensions between China and Taiwan…

PyPI temporarily pauses new users, projects amid high volume of malware
PyPI, the official third-party registry of open source Python…

Android phones are vulnerable to fingerprint brute-force attacks
Researchers at Tencent Labs and Zhejiang University have presented…

OilAlpha: Emerging Houthi-linked Cyber Threat Targets Arabian Android Users
A hacking group dubbed OilAlpha with suspected ties to Yemen's Houthi…

Cloned CapCut websites push information stealing malware
A new malware distribution campaign is underway impersonating…

Identifying a Patch Management Solution: Overview of Key Criteria
Software is rarely a one-and-done proposition.
In fact, any…

Dish Network likely paid ransom after recent ransomware attack
Dish Network, an American television provider, most likely paid…

ASUS routers knocked offline worldwide by bad security update
ASUS has apologized to its customers for a server-side security…

CISA warns of Samsung ASLR bypass flaw exploited in attacks
CISA warned today of a security vulnerability affecting Samsung…

Bad Magic’s Extended Reign in Cyber Espionage Goes Back Over a Decade
New findings about a hacker group linked to cyber attacks targeting…

Are Your APIs Leaking Sensitive Data?
It's no secret that data leaks have become a major concern for…

Microsoft: Notorious FIN7 hackers return in Clop ransomware attacks
A financially motivated cybercriminal group known as FIN7 resurfaced…

Luxottica confirms 2021 data breach after info of 70M leaks online
Luxottica has confirmed one of its partners suffered a data breach…

Indonesian Cybercriminals Exploit AWS for Profitable Crypto Mining Operations
A financially motivated threat actor of Indonesian origin has…

npm packages caught serving TurkoRAT binaries that mimic NodeJS
Researchers have discovered multiple npm packages named after…

U.K. Fraudster Behind iSpoof Scam Receives 13-Year Jail Term for Cyber Crimes
A U.K. national responsible for his role as the administrator…

KeePass Exploit Allows Attackers to Recover Master Passwords from Memory
A proof-of-concept (PoC) has been made available for a security…

Cisco Warns of Vulnerability in Popular Phone Adapter, Urges Migration to Newer Model
Cisco has warned of a critical security flaw in SPA112 2-Port…

Researchers Discover 3 Vulnerabilities in Microsoft Azure API Management Service
Three new security flaws have been disclosed in Microsoft Azure…

Researchers Uncover New Exploit for PaperCut Vulnerability That Can Bypass Detection
Cybersecurity researchers have found a way to exploit a recently…

Why the Things You Don’t Know about the Dark Web May Be Your Biggest Cybersecurity Threat
IT and cybersecurity teams are so inundated with security notifications…

CISA Issues Advisory on Critical RCE Affecting ME RTU Remote Terminal Units
The U.S. Cybersecurity and Infrastructure Security Agency (CISA)…

Meta Uncovers Massive Social Media Cyber Espionage Operations Across South Asia
Three different threat actors leveraged hundreds of elaborate…

Chinese Hacker Group Earth Longzhi Resurfaces with Advanced Malware Tactics
A Chinese state-sponsored hacking outfit has resurfaced with…

Hackers Exploiting 5-year-old Unpatched Vulnerability in TBK DVR Devices
Threat actors are actively exploiting an unpatched five-year-old…

Researchers Uncover New BGP Flaws in Popular Internet Routing Protocol Software
Cybersecurity researchers have uncovered weaknesses in a software…

Meta Takes Down Malware Campaign That Used ChatGPT as a Lure to Steal Accounts
Meta said it took steps to take down more than 1,000 malicious…

Google Introduces Passwordless Secure Sign-In with Passkeys for Google Accounts
Almost five months after Google added support for passkeys…

Operation SpecTor: $53.4 Million Seized, 288 Vendors Arrested in Dark Web Drug Bust
An international law enforcement operation has resulted in the…

Download the eBook: What Does it Take to be a Full-Fledged Virtual CISO?
Almost half of MSP clients fell victim to a cyberattack within…

Apple and Google Join Forces to Stop Unauthorized Location-Tracking Devices
Apple and Google have teamed up to work on a draft industry-wide…

LOBSHOT: A Stealthy, Financial Trojan and Info Stealer Delivered through Google Ads
In yet another instance of how threat actors are abusing Google…

BouldSpy Android Spyware: Iranian Government’s Alleged Tool for Spying on Minority Groups
A new Android surveillanceware possibly used by the Iranian government…

Cisco phone adapters vulnerable to RCE attacks, no fix available
Cisco has disclosed a vulnerability in the web-based management…

Hackers start using double DLL sideloading to evade detection
An APT hacking group known as "Dragon Breath," "Golden Eye Dog,"…

Kimsuky hackers use new recon tool to find security gaps
The North Korean Kimsuky hacking group has been observed employing…

Why Telecoms Struggle with SaaS Security
The telecom industry has always been a tantalizing target for…