Mustang Panda Deploys Advanced Malware to Spy on Asia-Pacific Governments

The threat actor tracked as Mustang Panda has refined its malware arsenal to include new tools in order to facilitate data exfiltration and the deployment of next-stage payloads, according to new findings from Trend Micro.
The cybersecurity firm, which is monitoring the activity cluster under the name Earth Preta, said it observed “the propagation of PUBLOAD via a variant of the worm HIUPAN.”

The Hacker News – ​Read More

Cybercriminals Target Latin American Banks with Mekotio, BBTok, and Grandoreiro Trojans

These campaigns aim to steal sensitive banking credentials using innovative tactics, expanding beyond traditional regions like Brazil and Argentina to industries such as manufacturing, retail, and financial services.

Cyware News – Latest Cyber News – ​Read More

Homeland Security Hopes to Scuttle Maritime Cyber-Threats

The U.S. Department of Homeland Security (DHS) has issued a request for information to assess the security of technology at ports in order to develop a Maritime Port Resiliency and Security Research Testbed.

Cyware News – Latest Cyber News – ​Read More

Slim CD Data Breach Impacts 1.7 Million Individuals

Slim CD says the personal and credit card information of 1.7 million was compromised in a ten-month-long data breach.

The post Slim CD Data Breach Impacts 1.7 Million Individuals appeared first on SecurityWeek.

SecurityWeek – ​Read More

Seventh Sense Unveils Revolutionary Privacy-Preserving Face-Based Public Key Infrastructure and eID Solution

Singapore, SG, 10th September 2024, CyberNewsWire

Hackread – Latest Cybersecurity, Tech, Crypto & Hacking News – ​Read More

CAMO Unveiled: How Cybercriminals Exploit Legitimate Software for Stealthy Attacks

CAMO, short for Commercial Applications, Malicious Operations, showcases how cybercriminals are increasingly utilizing legitimate IT tools to evade security measures and conduct stealthy attacks.

Cyware News – Latest Cyber News – ​Read More

Most Common Cybersecurity Threats to Avoid!

From phishing scams to ransomware attacks, discover what these threats look like and how you can protect yourself and your business.

Security | TechRepublic – ​Read More

10 Writing Tips for Cybersecurity Professionals

It takes more than technical knowledge to write about cybersecurity in a way people want to read. It takes creativity, discipline, and other key skills.

darkreading – ​Read More

Poland’s Cybersecurity Experts Foil Russian and Belarussian Attacks

Poland’s security officials said they have foiled cyberattacks and online blackmail attempts by groups acting for Russian and Belarusian services.

The post Poland’s Cybersecurity Experts Foil Russian and Belarussian Attacks appeared first on SecurityWeek.

SecurityWeek – ​Read More