Malware Developer Lures Child Exploiters Into Honeytrap to Extort Them

Threat actors created a website to impersonate UsenetClub, a subscription service for “uncensored” access to images and videos downloaded from Usenet. They claimed to provide free access to the site after the installation of a “CryptVPN” software.

Cyware News – Latest Cyber News – ​Read More

CrushFTP Patches Exploited Zero-Day Vulnerability

CrushFTP patches a zero-day vulnerability allowing unauthenticated attackers to escape the VFS and retrieve system files.

The post CrushFTP Patches Exploited Zero-Day Vulnerability appeared first on SecurityWeek.

SecurityWeek – ​Read More

MITRE Corporation Breached by Nation-State Hackers Exploiting Ivanti Flaws

The MITRE Corporation revealed that it was the target of a nation-state cyber attack that exploited two zero-day flaws in Ivanti Connect Secure appliances starting in January 2024.
The intrusion led to the compromise of its Networked Experimentation, Research, and Virtualization Environment (NERVE), an unclassified research and prototyping network.
The unknown adversary “performed reconnaissance

The Hacker News – ​Read More

Pentera’s 2024 Report Reveals Hundreds of Security Events per Week, Highlighting the Criticality of Continuous Validation

Over the past two years, a shocking 51% of organizations surveyed in a leading industry report have been compromised by a cyberattack. Yes, over half. 
And this, in a world where enterprises deploy an average of 53 different security solutions to safeguard their digital domain. 
Alarming? Absolutely.
A recent survey of CISOs and CIOs, commissioned by Pentera and

The Hacker News – ​Read More

UK Cyber Agency NCSC Announces Richard Horne as its Next Chief Executive

The hire marks another coup for the British public sector in poaching talent from the technology industry, particularly at the executive level, following the recruitment of Ollie Whitehouse as the NCSC’s chief technology officer earlier this year.

Cyware News – Latest Cyber News – ​Read More

Malvertising: Fake Popular Software Ads Deliver New MadMxShell Backdoor

By Deeba Ahmed

IT professionals are under attack! This article exposes a malicious malvertising campaign targeting IT teams with a novel backdoor named MadMxShell. Learn how attackers use typosquatting and DNS techniques to compromise systems.

This is a post from HackRead.com Read the original post: Malvertising: Fake Popular Software Ads Deliver New MadMxShell Backdoor

Hackread – Latest Cybersecurity, Tech, Crypto & Hacking News – ​Read More

Thousands of Palo Alto Firewalls Potentially Impacted by Exploited Vulnerability 

Shadowserver has identified roughly 6,000 internet-accessible Palo Alto Networks firewalls potentially vulnerable to CVE-2024-3400.

The post Thousands of Palo Alto Firewalls Potentially Impacted by Exploited Vulnerability  appeared first on SecurityWeek.

SecurityWeek – ​Read More

Ukrainian Soldiers’ Apps Increasingly Targeted for Spying, Cyber Agency Warns

The agency is attributing the surge to a group tracked as UAC-0184, which was spotted in February targeting an unnamed Ukrainian entity in Finland. CERT-UA does not attribute UAC-0184’s activity to any specific foreign cyber threat group.

Cyware News – Latest Cyber News – ​Read More

Deciphering the Economics of Software Development: An In-Depth Exploration

By Uzair Amir

The depth of activities within software development ranges from ideation and design to coding, testing, and deployment. The…

This is a post from HackRead.com Read the original post: Deciphering the Economics of Software Development: An In-Depth Exploration

Hackread – Latest Cybersecurity, Tech, Crypto & Hacking News – ​Read More

Ransomware Double-Dip: Re-Victimization in Cyber Extortion

Between crossovers – Do threat actors play dirty or desperate?
In our dataset of over 11,000 victim organizations that have experienced a Cyber Extortion / Ransomware attack, we noticed that some victims re-occur. Consequently, the question arises why we observe a re-victimization and whether or not this is an actual second attack, an affiliate crossover (meaning an affiliate has gone to

The Hacker News – ​Read More