The attack started on June 6 when a threat actor impersonated a company employee in order to their compromise business credentials.
Exploit attempts peaked between June 29 and July 6, when researchers said they saw “several thousands on some days.”
More details have emerged about attacks leveraging the Microsoft flaw that was disclosed and patched last week.
A new, native macOS version of the BeaverTail malware used by North Korean state-sponsored attackers has veen identified by researchers.
AT&T said threat actors had accessed an AT&T workspace on a third-party cloud platform and were able to exfiltrate customer call and text records.
A new threat actor is finding success in relying on open-source software (OSS) security tools and a networking mapping tool called SSH-Snake in its campaigns.
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) and Citrix are urging users and administrators to apply updates for the flaw.
APT40 has jumped on these flaws days or even hours within public release, warned a new advisory by CISA, the Australian government and others.
Ben Nahorney, threat intelligence analyst with Cisco, talks about how his team digs into malicious DNS activity to unearth new insights about how threat actors are using infostealers, ransomware and trojans.
A week after the disclosure of the regreSSHion CVE-2024-6387 flaw in OpenSSH, researchers have found a related flaw (CVE-2024-6409) in some recent versions of the library.
Chris Hughes, co-founder of Aquia and a Cyber Innovation Fellow at the Cybersecurity and Infrastructure Security Agency, joins Dennis Fisher to talk about the challenges of supply chain security, working with the government to address systemic issues, and the importance of collaboration.
Researchers have discovered the Eldorado group, which they said has developed and deployed a “highly effective” ransomware builder used to target both Windows and Linux systems.
After disclosing a security incident on Thursday, remote access software company TeamViewer on Friday said that the attack was “tied to credentials of a standard employee account” within its Corporate IT environment.
Fortra disclosed a critical-severity SQL injection flaw in FileCatalyst Workflow, and researchers have also published a proof-of-concept exploit code for the bug.
The popular polyfill.io JavaScript library has been used to inject malicious code into thousands of sites in the last few days.