fbpx

Richard Giddey

China cyber-attacks: this growing threat to UK security will not go away

China cyber-attacks: this growing threat to UK security will not go away

In March last year an integrated review of the UK’s defence and foreign policy said it would protect the country’s “democratic freedoms” from Chinese state attacks. A few months later the Electoral Commission confirmed why democratic institutions and processes were on the threat list as it revealed that a cyber-attack – by a then unidentified […]

China cyber-attacks: this growing threat to UK security will not go away Read More »

Russian Hackers Use 'WINELOADER' Malware to Target German Political Parties

Russian Hackers Use ‘WINELOADER’ Malware to Target German Political Parties

The WINELOADER backdoor used in recent cyber attacks targeting diplomatic entities with wine-tasting phishing lures has been attributed as the handiwork of a hacking group with links to Russia’s Foreign Intelligence Service (SVR), which was responsible for breaching SolarWinds and Microsoft. The findings come from Mandiant, which said Midnight Blizzard (aka APT29, BlueBravo, or Cozy

Russian Hackers Use ‘WINELOADER’ Malware to Target German Political Parties Read More »

Attackers are exploiting JetBrains TeamCity flaw to deliver a variety of malware - Help Net Security

Attackers are exploiting JetBrains TeamCity flaw to deliver a variety of malware – Help Net Security

Attackers are exploiting JetBrains TeamCity flaw to deliver a variety of malware Attackers are exploiting the recently patched JetBrains TeamCity auth bypass vulnerability (CVE-2024-27198) to deliver ransomware, cryptominers and remote access trojans (RATs), according to Trend Micro researchers. The CVE-2024-27198 timeline CVE-2024-27198, an authentication bypass vulnerability affecting the TeamCity server, has been disclosed and fixed

Attackers are exploiting JetBrains TeamCity flaw to deliver a variety of malware – Help Net Security Read More »

U.S. Sanctions Russians Behind 'Doppelganger' Cyber Influence Campaign

U.S. Sanctions Russians Behind ‘Doppelganger’ Cyber Influence Campaign

The U.S. Treasury Department’s Office of Foreign Assets Control (OFAC) on Wednesday announced sanctions against two 46-year-old Russian nationals and the respective companies they own for engaging in cyber influence operations. Ilya Andreevich Gambashidze (Gambashidze), the founder of the Moscow-based company Social Design Agency (SDA), and Nikolai Aleksandrovich Tupikin (Tupikin), the CEO and current owner

U.S. Sanctions Russians Behind ‘Doppelganger’ Cyber Influence Campaign Read More »

Russian Hackers Target Ukrainian Telecoms with Upgraded 'AcidPour' Malware

Russian Hackers Target Ukrainian Telecoms with Upgraded ‘AcidPour’ Malware

The data wiping malware called AcidPour may have been deployed in attacks targeting four telecom providers in Ukraine, new findings from SentinelOne show. The cybersecurity firm also confirmed connections between the malware and AcidRain, tying it to threat activity clusters associated with Russian military intelligence. “AcidPour’s expanded capabilities would enable it to better disable embedded

Russian Hackers Target Ukrainian Telecoms with Upgraded ‘AcidPour’ Malware Read More »

AndroxGh0st Malware Targets Laravel Apps to Steal Cloud Credentials

AndroxGh0st Malware Targets Laravel Apps to Steal Cloud Credentials

Cybersecurity researchers have shed light on a tool referred to as AndroxGh0st that’s used to target Laravel applications and steal sensitive data. “It works by scanning and taking out important information from .env files, revealing login details linked to AWS and Twilio,” Juniper Threat Labs researcher Kashinath T Pattan said. “Classified as an SMTP cracker,

AndroxGh0st Malware Targets Laravel Apps to Steal Cloud Credentials Read More »

From Deepfakes to Malware: AI's Expanding Role in Cyber Attacks

From Deepfakes to Malware: AI’s Expanding Role in Cyber Attacks

Large language models (LLMs) powering artificial intelligence (AI) tools today could be exploited to develop self-augmenting malware capable of bypassing YARA rules. “Generative AI can be used to evade string-based YARA rules by augmenting the source code of small malware variants, effectively lowering detection rates,” Recorded Future said in a new report shared with The

From Deepfakes to Malware: AI’s Expanding Role in Cyber Attacks Read More »

Dark Web Tool Arms Ransomware Gangs: E-commerce & Aviation Industries Targeted

Dark Web Tool Arms Ransomware Gangs: E-commerce & Aviation Industries Targeted

Cybersecurity researchers have published two concerning reports where the first report highlights the surge in cyber attacks against the aviation and aerospace industries – And the second report exposes a dark web tool called TMChecker fueling attacks against E-commerce platforms. Recent cyber incidents targeting the aerospace and aviation sectors have raised concerns about the industry’s

Dark Web Tool Arms Ransomware Gangs: E-commerce & Aviation Industries Targeted Read More »

Week in review: Cybersecurity job openings, hackers use 1-day flaws to drop custom Linux malware - Help Net Security

Week in review: Cybersecurity job openings, hackers use 1-day flaws to drop custom Linux malware – Help Net Security

Week in review: Cybersecurity job openings, hackers use 1-day flaws to drop custom Linux malware Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Transitioning to memory-safe languages: Challenges and considerations In this Help Net Security interview, Omkhar Arasaratnam, General Manager at the Open Source Security Foundation (OpenSSF), discusses

Week in review: Cybersecurity job openings, hackers use 1-day flaws to drop custom Linux malware – Help Net Security Read More »

Public anxiety mounts over critical infrastructure resilience to cyber attacks - Help Net Security

Public anxiety mounts over critical infrastructure resilience to cyber attacks – Help Net Security

Public anxiety mounts over critical infrastructure resilience to cyber attacks With temporary failures of critical infrastructure on the rise in the recent years, 81% of US residents are worried about how secure critical infrastructure may be, according to MITRE and The Harris Poll. Public views cyberattacks as greatest risk to critical infrastructure The public considers

Public anxiety mounts over critical infrastructure resilience to cyber attacks – Help Net Security Read More »

Scroll to Top