APT29 utilizes GRAPELOADER Malware Targeting European Diplomats via Wine-Tasting Lures – Source:thehackernews.com

In a recent cyber attack, the infamous Russian state-sponsored threat actor APT29 has resurfaced with an advanced phishing campaign that is specifically targeting diplomatic...

Chinese hackers have updated the MysterySnail malware to infiltrate sensitive government networks.

An upgraded version of the MysterySnail remote access trojan (RAT) malware has been uncovered by researchers, shedding light on the sophisticated cyberattacks carried out by the Chinese-speaking IronHusky hacker group targeting government organizations in Russia and Mongolia. The newly discovered version of MysterySnail malware was...

Improve Organization with Project Management Skills

In the world of cybersecurity, professionals are often trained to focus on vulnerabilities, exploits,...

Extension of US Cybersecurity Information Sharing Bill

The Cybersecurity Information Sharing Extension Act, introduced by U.S. senators Gary Peters and Mike...

APT29 utilizes GRAPELOADER Malware Targeting European Diplomats via Wine-Tasting Lures – Source:thehackernews.com

In a recent cyber attack, the infamous Russian state-sponsored threat actor APT29 has resurfaced...

Chinese hackers have updated the MysterySnail malware to infiltrate sensitive government networks.

An upgraded version of the MysterySnail remote access trojan (RAT) malware has been uncovered...

AI Now: The Use of AI by Telecom Companies in India to Combat Cyber Frauds – Times Now

Telecom companies in India are increasingly turning to artificial intelligence (AI) to combat cyber...

Attackers have been exploiting SonicWall SMA appliances since January 2025, according to securityaffairs.com

Threat actors have been actively exploiting a critical remote code execution vulnerability in SonicWall...

APT29 utilizes GRAPELOADER Malware Targeting European Diplomats via Wine-Tasting Lures – Source:thehackernews.com

In a recent cyber attack, the infamous Russian state-sponsored threat actor APT29 has resurfaced with an advanced phishing campaign that is specifically targeting diplomatic...

Improve Organization with Project Management Skills

In the world of cybersecurity, professionals are often trained to focus on vulnerabilities, exploits,...

Extension of US Cybersecurity Information Sharing Bill

The Cybersecurity Information Sharing Extension Act, introduced by U.S. senators Gary Peters and Mike...

Improve Organization with Project Management Skills

In the world of cybersecurity, professionals are often trained to focus on vulnerabilities, exploits,...
spot_img

Cyber Balkans

Keeper Security Secures Minority Growth Equity Investment from Summit Partners

Cybersecurity firm Keeper Security has secured a significant minority investment from global growth equity...

What is a Passkey?

Passkeys continue their rise in popularity as an alternative form of user authentication that...

ProofPoint Report: Cybersecurity Stress Resurfaces Following a Brief Calm

A recent survey conducted by cybersecurity firm ProofPoint has revealed that 68% of Chief...

Methods for detecting PaperCut vulnerabilities are circumventable, and Iranian cyber attackers are now involved. A fresh breed of ransomware uses VPNs to penetrate its...

PaperCut vulnerability detection methods have recently been discovered to be easily bypassed, allowing hackers...

Advancements in AI Cybersecurity: Utilizing ChatGPT to Remain Ahead of Cyber Criminals

The field of cybersecurity has rapidly evolved in recent times as the world becomes...

Extension of US Cybersecurity Information Sharing Bill

The Cybersecurity Information Sharing Extension Act, introduced by U.S. senators Gary Peters and Mike...

Chinese Nexus Hackers Use Ivanti Connect Secure Vulnerability to Gain Access

In a recent cyber-espionage operation, a group identified as UNC5221, believed to have ties...

Systems Exposed by Erlang OTP SSH Vulnerability

A critical vulnerability, identified as CVE-2025-32433, has recently been uncovered in the Erlang/OTP SSH,...

Delilah Schwartz from Cybersixgill Talks About the Evolving Dark Web and New Threats from ChatGPT and Other AI Technologies.

Delilah Schwartz, a cyber threat analyst from Cybersixgill, has recently given an insightful interview...

Risk and Repeat: Are data extortion attacks equivalent to ransomware?

The threat landscape of ransomware has undergone significant changes, leading to a transformation in...

What is a Passkey?

Passkeys continue their rise in popularity as an alternative form of user authentication that...

Salt Security collaborates with leading API testing experts in IT security

Salt Security has launched its Salt Technical Ecosystem Partner (STEP) program, aimed at helping...

ProofPoint Report: Cybersecurity Stress Resurfaces Following a Brief Calm

A recent survey conducted by cybersecurity firm ProofPoint has revealed that 68% of Chief...

Keeper Security Secures Minority Growth Equity Investment from Summit Partners

Cybersecurity firm Keeper Security has secured a significant minority investment from global growth equity...

Malware

What’s in Store for the CVE Program Post-Mitre Management?

The Common Vulnerabilities and Exposures (CVE) Program, managed by Mitre, narrowly avoided a funding crisis recently when the U.S. Department of Homeland Security stepped in to provide funding for the next 11 months. While this last-minute reprieve is welcome news, it underscores the need...

Nokoyawa Ransomware Exploits Windows Zero Day Vulnerabilities

A report released by Kaspersky Labs recently shed light on a threat actor that...

PEGA Committee Advocates for Restrictions on Commercial Spyware

The European Parliament committee investigating the abuse of commercial spyware tools such as Pegasus...

Live Webinar: Understanding How Your API Gets Compromised and How to Prevent It

ISMG Extends Warm Welcome to New Registrants ISMG, a leading information security media group, expresses...

Live Webinar on Resilience in Crisis: Rebooting Your Minimum Viable Company Quickly

The registration process with ISMG is now easier than ever. By completing your profile,...
spot_img

RISK MANAGEMENTS

APT29 utilizes GRAPELOADER Malware Targeting European Diplomats via Wine-Tasting Lures – Source:thehackernews.com

In a recent cyber attack, the infamous Russian state-sponsored threat actor APT29 has resurfaced with an advanced phishing campaign that is specifically targeting diplomatic...

Explaining the Difference between Symmetric and Asymmetric Encryption

Data is one of the most valuable assets for any organization today. The vast...

AI Now: The Use of AI by Telecom Companies in India to Combat Cyber Frauds – Times Now

Telecom companies in India are increasingly turning to artificial intelligence (AI) to combat cyber...

Chinese APT IronHusky Deploys New Version of MysterySnail RAT in Russia – Source: hackread.com

Recently, Kaspersky researchers have brought to light the reappearance of the MysterySnail RAT, a malicious software associated with the Chinese IronHusky APT group. This RAT has resurfaced after a period of dormancy and is now actively targeting government entities in Mongolia and Russia with...

Man Assisted Individuals in China Secure Jobs Involving Sensitive US Government Projects

A Maryland man, Minh Phuong Ngoc Vong, 40, of Bowie, recently confessed in court to his involvement in a scheme where he facilitated individuals...

Cyber Architecture

Extension of US Cybersecurity Information Sharing Bill

The Cybersecurity Information Sharing Extension Act, introduced by U.S. senators Gary Peters and Mike...

Chinese Nexus Hackers Use Ivanti Connect Secure Vulnerability to Gain Access

In a recent cyber-espionage operation, a group identified as UNC5221, believed to have ties...

Hacking US crosswalks to talk like Zuck is as easy as 1234 – Source: go.theregister.com

Several US cities have recently experienced crosswalk buttons being hacked to play the AI-spoofed...

Scalper Bots Facilitating DVSA Driving Test Black Market

The surge in the use of scalper bots is creating chaos for driving test...

Police to apprehend second suspect in cyber fraud case in Bhubaneswar

Berhampur Police Claims Progress in Cyber Fraud Case Investigation In a recent development, Berhampur police have reported significant progress in the investigation of a cyber fraud case involving a teacher couple from Ganjam district. The case, which revolves around a 'digital arrest' scam that resulted...

All articles

APT29 utilizes GRAPELOADER Malware Targeting European Diplomats via Wine-Tasting Lures – Source:thehackernews.com

In a recent cyber attack, the infamous Russian state-sponsored threat actor APT29 has resurfaced...

Chinese hackers have updated the MysterySnail malware to infiltrate sensitive government networks.

An upgraded version of the MysterySnail remote access trojan (RAT) malware has been uncovered...

Improve Organization with Project Management Skills

In the world of cybersecurity, professionals are often trained to focus on vulnerabilities, exploits,...

Extension of US Cybersecurity Information Sharing Bill

The Cybersecurity Information Sharing Extension Act, introduced by U.S. senators Gary Peters and Mike...

AI Now: The Use of AI by Telecom Companies in India to Combat Cyber Frauds – Times Now

Telecom companies in India are increasingly turning to artificial intelligence (AI) to combat cyber...

Attackers have been exploiting SonicWall SMA appliances since January 2025, according to securityaffairs.com

Threat actors have been actively exploiting a critical remote code execution vulnerability in SonicWall...

What’s in Store for the CVE Program Post-Mitre Management?

The Common Vulnerabilities and Exposures (CVE) Program, managed by Mitre, narrowly avoided a funding...

Chinese Nexus Hackers Use Ivanti Connect Secure Vulnerability to Gain Access

In a recent cyber-espionage operation, a group identified as UNC5221, believed to have ties...

Cyber Signals Issue 9: The Rise of AI-Powered Deception in Fraud Prevention

In the realm of cybersecurity, Microsoft has been taking proactive measures to safeguard its...

SquareX Reveals Data Splicing Attacks at BSides San Francisco, Exposing Major DLP Vulnerability Impacting Data Security for Millions

SquareX researchers Jeswin Mathai and Audrey Adeline are set to unveil a groundbreaking discovery...

Great Companies Focus on Engineering Experiences, Not Just Building Apps

In the realm of business, one of the most prized possessions a company can...

Chinese APT IronHusky Deploys New Version of MysterySnail RAT in Russia – Source: hackread.com

Recently, Kaspersky researchers have brought to light the reappearance of the MysterySnail RAT, a...