Ultime Notizie

US indicts Black Kingdom ransomware operator: technical analysis of ProxyLogon exploitation and law enforcement response
Ransomware

US indicts Black Kingdom ransomware operator: technical analysis of ProxyLogon exploitation and law enforcement response

3 May 2025 securebulletin.com

The U.S. Department of Justice unsealed charges against Yemeni national Rami Khaled Ahmed (36) for deploying Black Kingdom ransomware via...
Hijacking Trust: how Gmail and Google APIs are being weaponized for stealthy C2 channels
Spyware

Hijacking Trust: how Gmail and Google APIs are being weaponized for stealthy C2 channels

1 May 2025 securebulletin.com

In the ever-evolving landscape of cybersecurity, attackers are increasingly exploiting trusted services to establish covert command-and-control (C2) channels. By leveraging...
Kintetsu World Express ransomware attack: technical overview and response
Ransomware

Kintetsu World Express ransomware attack: technical overview and response

30 April 2025 securebulletin.com

Kintetsu World Express (KWE), a major Japanese global logistics provider, has confirmed a significant ransomware attack that began impacting its...
JFL Hospital targeted in ransomware attack amid wave of cyber incidents in US Virgin Islands
Ransomware

JFL Hospital targeted in ransomware attack amid wave of cyber incidents in US Virgin Islands

29 April 2025 securebulletin.com

Governor Juan F. Luis Hospital & Medical Center (JFL) in the US Virgin Islands has become the latest government entity...
Malicious NPM packages targeting PayPal users: a recap analysis
Malware

Malicious NPM packages targeting PayPal users: a recap analysis

12 April 2025 securebulletin.com

FortiGuard Labs recently uncovered a series of malicious NPM packages designed to steal sensitive information from compromised systems. These packages,...
Everest ransomware gang faces unprecedented blow: leak site hacked and defaced
Ransomware

Everest ransomware gang faces unprecedented blow: leak site hacked and defaced

7 April 2025 securebulletin.com

In a surprising turn of events, the Everest ransomware gang—a notorious Russia-linked cybercriminal organization—has suffered a significant setback. Over the...
Crocodilus: a sophisticated new Android banking trojan emerges
Spyware

Crocodilus: a sophisticated new Android banking trojan emerges

30 March 2025 securebulletin.com

A new Android banking trojan, dubbed Crocodilus, has been discovered targeting users primarily in Spain and Turkey. This malware isn’t...
Stealth malware strikes WordPress via MU-Plugins: a technical deep dive
Malware

Stealth malware strikes WordPress via MU-Plugins: a technical deep dive

30 March 2025 securebulletin.com

The Sucuri research team has recently uncovered a concerning trend: threat actors are increasingly leveraging the WordPress mu-plugins directory to...
New breed of Android malware leverages .NET MAUI to slip past defenses
Malware

New breed of Android malware leverages .NET MAUI to slip past defenses

25 March 2025 securebulletin.com

Exploiting cross-platform development frameworks to deliver insidious malware. A recent report from McAfee highlights the emergence of Android malware campaigns...
Western Alliance Bank data breach: 21,899 customers impacted
Ransomware

Western Alliance Bank data breach: 21,899 customers impacted

18 March 2025 securebulletin.com

The recent data breach at Western Alliance Bank underscores a growing concern in the cybersecurity landscape: the risks posed by...
New Android spyware “KoSpy” linked to North Korean APT37
Spyware

New Android spyware “KoSpy” linked to North Korean APT37

13 March 2025 securebulletin.com

A new Android spyware, dubbed “KoSpy,” has been discovered by researchers at Lookout, adding another concerning tool to the arsenal...
Akira ransomware’s ingenious IoT gambit: when webcams become cyberweapons
Ransomware

Akira ransomware’s ingenious IoT gambit: when webcams become cyberweapons

9 March 2025 securebulletin.com

Akira group demonstrated how unsecured IoT devices can bypass enterprise-grade defenses. In a case analyzed by S-RM, attackers weaponized a...