Mass-spreading campaign targeting Zimbra users
ESET researchers have observed a new phishing campaign targeting users of the Zimbra Collaboration email server.
Read MoreESET researchers have observed a new phishing campaign targeting users of the Zimbra Collaboration email server.
Read MoreCybersecurity company Cyfirma claims to have uncovered the real identity of the developer behind the CypherRAT and CraxsRAT remote access trojans (RATs). Using the online handle of ‘EVLF DEV’ and operating out of Syria for the past eight years, the individual is believed to have made over $75,000 from selling the two RATs to various threat actors. The same person is also a malware-as-a-service (MaaS) operator, according to Cyfirma. For the past three years, EVLF…
Read MoreWhat happens to cyberweapons after a cyberwar?
Read MoreCurrent LLMs are just not mature enough for high-level tasks
Read MoreBlack Hat is big on AI this year, and for a good reason
Read MoreSuspected North Korean hackers have attempted an attack targeting a major joint military exercise between Seoul and Washington that starts on Monday, South Korean police said. South Korea and the United States will kick off the annual Ulchi Freedom Shield drills on Monday through August 31 to counter growing threats from the nuclear-armed North. Pyongyang views such exercises as rehearsals for an invasion and has repeatedly warned it would take “overwhelming” action in response. The…
Read MoreHiding behind a black box and hoping no one will hack it has been routinely proven to be unwise and less secure.
Read MoreDEF CON, the annual hacker’s convention in Las Vegas, was interrupted on Saturday evening when authorities evacuated the convention due to a bomb threat.
Read MoreThe limits of current AI need to be tested before we can rely on their output
Read MoreSecurityWeek is publishing a weekly cybersecurity roundup that provides a concise compilation of noteworthy stories that might have slipped under the radar. We provide a valuable summary of stories that may not warrant an entire article, but are nonetheless important for a comprehensive understanding of the cybersecurity landscape. Each week, we will curate and present a collection of noteworthy developments, ranging from the latest vulnerability discoveries and emerging attack techniques to significant policy changes and…
Read More