APT ‘Blind Eagle’ Targets Colombian Government

The South American-based advanced persistent threat group is using an exploit with a “high infection rate,” according to research from Check Point.

darkreading – ​Read More

Ex-Employee Found Guilty in Revenge Kill-Switch Scheme

Clandestine kill switch was designed to lock out other users if the developer’s account in the company’s Windows Active Directory was ever disabled.

darkreading – ​Read More

Trump administration ends FTC’s ransomware data breach case against MGM Resorts

The Federal Trade Commission (FTC) shuttered its case against MGM Resorts International centered on the company’s handling of personal data stolen during a 2023 ransomware attack.

The Record from Recorded Future News – ​Read More

Trump Coins Used as Lure in Malware Campaign

Binance is being spoofed in an email campaign using free TRUMP Coins as a lure leading to the installation of the ConnectWise RAT.

The post Trump Coins Used as Lure in Malware Campaign appeared first on SecurityWeek.

SecurityWeek – ​Read More

Hacker accessed PowerSchool’s network months before massive December breach

CrowdStrike says a hacker had access to PowerSchool’s internal system as far back as August.

© 2024 TechCrunch. All rights reserved. For personal use only.

Security News | TechCrunch – ​Read More

Details Disclosed for SCADA Flaws That Could Facilitate Industrial Attacks

Palo Alto Networks has shared details on several high-severity Mitsubishi Electric and Iconics SCADA vulnerabilities.

The post Details Disclosed for SCADA Flaws That Could Facilitate Industrial Attacks appeared first on SecurityWeek.

SecurityWeek – ​Read More

Following takedown operation, Garantex invites customers to ‘face-to-face’ Moscow meeting

Russian crypto exchange Garantex has yet to directly address the international law enforcement operation that resulted in the seizure of its domains, and criminal charges against two of its administrators.

© 2024 TechCrunch. All rights reserved. For personal use only.

Security News | TechCrunch – ​Read More

Researchers Expose New Polymorphic Attack That Clones Browser Extensions to Steal Credentials

Cybersecurity researchers have demonstrated a novel technique that allows a malicious web browser extension to impersonate any installed add-on.
“The polymorphic extensions create a pixel perfect replica of the target’s icon, HTML popup, workflows and even temporarily disables the legitimate extension, making it extremely convincing for victims to believe that they are providing credentials to

The Hacker News – ​Read More

Google Chrome is killing more extensions than you think – is your old favorite on the list?

Google’s Manifest V3 platform is clobbering many popular extensions. Here’s why and what you can do about it.

Latest stories for ZDNET in Security – ​Read More

Cobalt Strike Abuse Dropped 80% in Two Years

Fortra has shared an update on the effects of actions taken to reduce the abuse of Cobalt Strike by threat actors.

The post Cobalt Strike Abuse Dropped 80% in Two Years appeared first on SecurityWeek.

SecurityWeek – ​Read More