Infosecurity News
New Android Espionage Campaign Spotted in India and Pakistan
A new cyber espionage campaign, called ‘eXotic Visit,’ targeted Android users in South Asia via seemingly legitimate messaging apps
Raspberry Robin Distributed Through Windows Script Files
Distribution vectors of the Raspberry Robin worm now include Windows Script Files (WSF) alongside other methods like USB drives
Threat Actors Game GitHub Search to Spread Malware
Checkmarx warns of GitHub search result manipulation designed to promote malicious repositories
US Data Breach Reports Surge 90% Annually in Q1
The number of publicly reported data breaches and leaks grew 90% in the first three months of the year
Rhadamanthys Malware Deployed By TA547 Against German Targets
Proofpoint said this is the first time the threat actor has been seen using LLM-generated PowerShell scripts
LG TV Vulnerabilities Expose 91,000 Devices
The issues identified permit unauthorized access to the TV’s root system by bypassing authorization mechanisms
Women Experience Exclusion Twice as Often as Men in Cybersecurity
A WiCyS report detailed the causes of disparities in the experiences of women working in cybersecurity compared to men, including respect and exclusion
Windows: New 'BatBadBut' Rust Vulnerability Given Highest Severity Score
A flaw in the Rust standard library exposes Windows systems to command injection attacks
US Claims to Have Recovered $1.4bn in COVID Fraud
The DoJ says it has seized $1.4bn and charged 3500 defendants in COVID fraud cases since 2021
Microsoft Patches 150 Flaws Including Two Zero-Days
April’s Patch Tuesday saw fixes for 150 CVEs, including two being actively exploited in the wild
Half of UK Businesses Hit by Cyber-Incident in Past Year, UK Government Finds
The UK Government’s latest Cyber Security Breaches Survey found a large increase in the proportion of businesses impacted by a cyber-attack or breach in the past 12 months
Hackers Use Malware to Hunt Software Vulnerabilities
Palo Alto Networks observed growing malware-initiated vulnerability scanning activity
Change Healthcare Hit By Cyber Extortion Again
RansomHub has surfaced threatening to expose stolen data unless another ransom is paid
Research Unearths RUBYCARP’s Multi-Miner Assault on Crypto
Sysdig stated that, by deploying multiple miners, the group decreased attack time and detection risk
Foreign Interference Drives Record Surge in IP Theft
DTEX claims industrial espionage and IP theft are at an all-time high thanks to malicious insiders
Over 90,000 D-Link NAS Devices Are Under Attack
Threat actors are targeting a high severity vulnerability in close to 100,000 legacy D-Link devices
Why Identity Management is Key in a Cyber Resilience Strategy
For the fourth edition of Identity Management Day, the Identity Defined Security Alliance shared staggering numbers on the boom of identity-related cyber incidents
US Federal Data Privacy Law Introduced by Legislators
Two US lawmakers have published a draft federal data privacy law, dubbed the American Privacy Rights Act, which aims to provide protections for the personal information of all US citizens
Byakugan Infostealer Capabilities Revealed
Fortinet said the malware functions identified include screen monitoring, screen capturing, cryptomining and more
New Malware “Latrodectus” Linked to IcedID
The malware, discovered by Proofpoint and Team Cymru, was mainly utilized by initial access brokers