5 Most Common Malware Techniques in 2024

Tactics, techniques, and procedures (TTPs) form the foundation of modern defense strategies. Unlike indicators of compromise (IOCs), TTPs are more stable, making them a reliable way to identify specific cyber threats. Here are some of the most commonly used techniques, according to ANY.RUN’s Q3 2024 report on malware trends, complete with real-world examples.
Disabling of Windows Event Logging

The Hacker News – ​Read More

Cisco Releases Patch for Critical URWB Vulnerability in Industrial Wireless Systems

Cisco has released security updates to address a maximum severity security flaw impacting Ultra-Reliable Wireless Backhaul (URWB) Access Points that could permit unauthenticated, remote attackers to run commands with elevated privileges.
Tracked as CVE-2024-20418 (CVS score: 10.0), the vulnerability has been described as stemming from a lack of input validation to the web-based management

The Hacker News – ​Read More

Canada Orders TikTok to Shut Down Canadian Operations Over Security Concerns

The Canadian government on Wednesday ordered ByteDance-owned TikTok to dissolve its operations in the country, citing national security risks, but stopped short of instituting a ban on the popular video-sharing platform.
“The decision was based on the information and evidence collected over the course of the review and on the advice of Canada’s security and intelligence community and other

The Hacker News – ​Read More

Fake Copyright Infringement Emails Spread Rhadamanthys

Attackers are triggering victims’ deep-seated fear of getting in trouble in order to spread the sophisticated stealer across continents.

darkreading – ​Read More

Chinese Gamers Targeted in Winos4.0 Framework Scam

Campaigns like Silver Fox and Void Arachne are deploying the framework, using social media and messaging platforms to lure in victims.

darkreading – ​Read More

AI-Assisted Attacks Top Cyber Threat For Third Consecutive Quarter, Gartner Finds

AI-enhanced malicious attacks are a top concern for 80% of executives, and for good reason, as there is a lot of evidence that bad actors are exploiting the technology.

Security | TechRepublic – ​Read More

German Law Could Protect Researchers Reporting Vulns

The draft amendment also includes prison time for those who access systems to maliciously spy or intercept data.

darkreading – ​Read More

Increasing Awareness of DNS Hijacking: A Growing Cyber Threat

Read more about DNS hijacking and how organizations can prevent it.

Security | TechRepublic – ​Read More

International Police Effort Obliterates Cybercrime Network

Interpol disrupts 22,000 malicious IP addresses, 59 servers, 43 electronic devices, and arrests 41 suspected cybercriminals.

darkreading – ​Read More

Scammers Target BASE and Ethereum with Political Meme Coins and Rug Pulls

Global Blockchain Scams Surge on BASE and Across Networks, Trugard Labs Reports.

Hackread – Latest Cybersecurity, Tech, Crypto & Hacking News – ​Read More