Ultime Notizie

Cryptojacking: protecting Docker and Kubernetes environments from new attacks
Malware

Cryptojacking: protecting Docker and Kubernetes environments from new attacks

15 December 2024 securebulletin.com

Cryptojacking—the unauthorized use of systems to mine cryptocurrency—has seen a troubling surge, with attackers increasingly exploiting misconfigured Docker and Kubernetes...
DragonRansomware emerges: a new threat on Telegram
Ransomware

DragonRansomware emerges: a new threat on Telegram

15 December 2024 securebulletin.com

A new ransomware variant called DragonRansomware has made its debut, promising customizable and efficient ransomware operations aimed at Windows systems....
Emerging ransomware threat targets macOS users
Ransomware

Emerging ransomware threat targets macOS users

15 December 2024 securebulletin.com

Apple users, beware! A new ransomware variant, macOS.NotLockBit, is shifting the cybersecurity landscape, traditionally dominated by Windows and Linux threats,...
Ransomware claims surge: Akira and RansomHub lead the charge
Ransomware

Ransomware claims surge: Akira and RansomHub lead the charge

14 December 2024 securebulletin.com

As ransomware incidents reach unprecedented levels, these groups have gained notoriety for their aggressive tactics and increasing effectiveness in targeting...
November 2024 APT attack trends in South Korea
Spyware

November 2024 APT attack trends in South Korea

9 December 2024 dark6

In November 2024, South Korea faced a surge in Advanced Persistent Threats (APTs), with spear phishing being the most prevalent...
QNAP NAS vulnerabilities
Vulnerability

QNAP NAS vulnerabilities

9 December 2024 dark6

QNAP NAS systems, widely used for data storage, have been flagged for several critical vulnerabilities that pose significant risks to...
Phishing evolved: how fake CAPTCHAs are tricking users
Phishing

Phishing evolved: how fake CAPTCHAs are tricking users

3 November 2024 dark6

A recent article highlights a sophisticated phishing attack discovered by ANY.RUN, a malware analysis platform. This attack employs a fake...
Apache Tomcat vulnerability (CVE-2024-38286)
Vulnerability

Apache Tomcat vulnerability (CVE-2024-38286)

24 September 2024 dark6

A severe vulnerability has emerged in Apache Tomcat, a widely used Java application server. Identified as CVE-2024-38286, this flaw poses...
Unmasking north korean IT workers targeting global tech sectors
Spyware

Unmasking north korean IT workers targeting global tech sectors

24 September 2024 dark6

In today’s digital landscape, organizations face an escalating threat from cybersecurity attacks, leading to severe financial and reputational consequences. Cybersecurity...
Beware of sophisticated phishing attacks targeting hotel Bookings
Phishing

Beware of sophisticated phishing attacks targeting hotel Bookings

20 September 2024 dark6

Phishing attacks are a common form of cybercrime that involves attackers impersonating legitimate entities to trick victims into revealing sensitive...
Unveiling UNC1860: Iran’s stealthy cyber threat
Malware

Unveiling UNC1860: Iran’s stealthy cyber threat

20 September 2024 dark6

In the ever-evolving cybersecurity landscape, state-sponsored threat actors continue to pose significant risks to organizations worldwide. Among them is UNC1860,...
TeamTNT resurfaces: cybersecurity experts warn of new cloud server attacks
Spyware

TeamTNT resurfaces: cybersecurity experts warn of new cloud server attacks

20 September 2024 dark6

The notorious hacking group TeamTNT has returned with a new campaign targeting Virtual Private Server (VPS) infrastructures running on the...