Checkmarx has observed a novel npm supply chain attack using Ethereum smart contracts to manage command-and-control (C2) operations This article has been indexed from www.infosecurity-magazine.com Read the original article: Supply Chain Attack Uses Smart Contracts for C2 Ops
Tag: www.infosecurity-magazine.com
UK Council Sites Recover Following Russian DDoS Blitz
Several UK council websites are back online after being disrupted by Russian hacktivist DDoS attacks This article has been indexed from www.infosecurity-magazine.com Read the original article: UK Council Sites Recover Following Russian DDoS Blitz
Sophos Warns Chinese Hackers Are Becoming Stealthier
Sophos provided details of changing tactics by Chinese APT groups over a five-year period, involving a shift towards stealthy, targeted attacks This article has been indexed from www.infosecurity-magazine.com Read the original article: Sophos Warns Chinese Hackers Are Becoming Stealthier
CISA Warns of Critical Software Vulnerabilities in Industrial Devices
Multiple vulnerabilities in Rockwell Automation and Mitsubishi products could allow ICS cyber-attacks This article has been indexed from www.infosecurity-magazine.com Read the original article: CISA Warns of Critical Software Vulnerabilities in Industrial Devices
US and Israel Warn of Iranian Threat Actor’s New Tradecraft
US and Israeli government agencies have warned that the Iranian state-sponsored threat actor Cotton Sandstorm is deploying new tradecraft to expand its operations This article has been indexed from www.infosecurity-magazine.com Read the original article: US and Israel Warn of Iranian…
New Xiu Gou Phishing Kit Targets US, Other Countries with Mascot
New phishing kit Xiu Gou, featuring a unique “doggo” mascot, targets users in US, UK, Spain, Australia and Japan with 2000+ scam websites This article has been indexed from www.infosecurity-magazine.com Read the original article: New Xiu Gou Phishing Kit Targets…
Misconfigured Git Configurations Targeted in Emeraldwhale Attack
Emeraldwhale breach allowed access to over 10,000 repositories and resulted in the theft of more than 15,000 cloud service credentials This article has been indexed from www.infosecurity-magazine.com Read the original article: Misconfigured Git Configurations Targeted in Emeraldwhale Attack
Misconfigured Git Configurations Targeted in EMERALDWHALE Attack
EMERALDWHALE breach allowed access to over 10,000 repositories and resulted in the theft of more than 15,000 cloud service credentials This article has been indexed from www.infosecurity-magazine.com Read the original article: Misconfigured Git Configurations Targeted in EMERALDWHALE Attack
Canadian Government Data Stolen By Chinese Hackers
A report by the Canadian Centre for Cyber Security described China as the most sophisticated cyber threat to Canada, also identified India as an emerging threat This article has been indexed from www.infosecurity-magazine.com Read the original article: Canadian Government Data…
North Korean Hackers Collaborate with Play Ransomware
Palo Alto Networks’ Unit 42 has observed the first-ever collaboration between North Korean-backed Jumpy Pisces and Play ransomware This article has been indexed from www.infosecurity-magazine.com Read the original article: North Korean Hackers Collaborate with Play Ransomware