The long-active, India-sponsored cyber-threat group targeted multiple entities across Asia, Africa, the Middle East, and even Europe in a recent attack wave that demonstrated the use of a previously unknown post-exploit tool called StealerBot.
Автор: Elizabeth Montalbano, Contributing Writer
Cyberattackers Unleash Flood of Potentially Disruptive Election-Related Activity
Organizations should be on high alert until next month’s US presidential election to ensure the integrity of the voting process, researchers warn.
ConfusedPilot Attack Can Manipulate RAG-Based AI Systems
Attackers can introduce a malicious document in systems such as Microsoft 365 Copilot to confuse the system, potentially leading to widespread misinformation and compromised decision-making processes.
Microsoft: Creative Abuse of Cloud Files Bolsters BEC Attacks
Since April, attackers have increased their use of Dropbox, OneDrive, and SharePoint to steal the credentials of business users and conduct further malicious activity.
American Water Suffers Network Disruptions After Cyberattack
The largest publicly traded water utility in the US was forced to disconnect some of its online systems, and its website and telecommunications system remained unavailable as of Tuesday morning, Oct. 8.
Single HTTP Request Can Exploit 6M WordPress Sites
The popular LiteSpeed Cache plug-in is vulnerable to unauthenticated privilege escalation via a dangerous XSS flaw.
AI ‘Nude Photo Generator’ Delivers Infostealers Instead of Images
The FIN7 group is mounting a sophisticated malware campaign that spans numerous websites, to lure people with a deepfake tool promising to create nudes out of photos.
Python-Based Malware Slithers Into Systems via Legit VS Code
The prolific Chinese APT Mustang Panda is the likely culprit behind a sophisticated cyber-espionage attack that sets up persistent remote access to victim machines.
Cyberattackers Use HR Targets to Lay More_Eggs Backdoor
The FIN6 group is the likely culprit behind a spear-phishing campaign that demonstrates a shift in tactics, from targeting job seekers to going after those who hire.
GenAI Writes Malicious Code to Spread AsyncRAT
Researchers have uncovered one of the first examples of threat actors using artificial intelligence chatbots for malware creation, in a phishing attack spreading the open-source remote access trojan.