Google announced patches for over 40 vulnerabilities as part of Android’s November 2024 security update, including two flaws that have been actively exploited. The first, tracked as CVE-2024-43047, was disclosed last month after evidence of in-the-wild exploitation was found by Amnesty International and Google’s Threat Analysis Group (TAG).

Read More
1 min read

Newpark Resources, a Texas-based oilfield supplier, recently reported a ransomware attack that impacted its information systems and business applications. The company detected the breach on October 29 and responded by initiating a cybersecurity response plan.

Read More
1 min read

Cybersecurity researchers at Socket Security have discovered a malicious Python package called "Fabrice" on PyPI, which has been covertly stealing AWS credentials from developers for three years.

Read More
1 min read

The Androxgh0st botnet, which initially targeted web servers, has evolved by integrating components from the Mozi botnet, a notorious malware that primarily infects IoT devices. According to CloudSEK researchers, this integration allows Androxgh0st to expand its reach, leveraging Mozi’s payloads and propagation mechanisms to infect a wider array of IoT devices.

Read More
1 min read

North Korean hackers, specifically the BlueNoroff group, are targeting macOS users with a sophisticated phishing campaign that uses fake cryptocurrency-related PDFs. The attackers are sending emails with malicious links disguised as PDFs on topics such as Bitcoin price surges and decentralized finance (DeFi).

Read More
1 min read

Schneider Electric is investigating a breach after hackers, known as Hellcat, claimed to have stolen sensitive data from its Jira issue tracking system.

Read More
1 min read

Operation Synergia II, a global cybercrime crackdown, resulted in the takedown of over 22,000 IP addresses linked to phishing, ransomware, and infostealer attacks.

Read More
1 min read

A ransomware attack in July 2024 targeted the City of Columbus, Ohio, resulting in the theft of personal information from 500,000 residents. The breach exposed sensitive data, including names, bank accounts, and Social Security numbers.

Read More
1 min read

Cybercriminals are leveraging DocuSign’s APIs to send realistic phishing invoices that evade spam filters by appearing to originate from legitimate DocuSign accounts. This technique allows attackers to target users with fake invoices from trusted platforms like Norton, increasing the risk of deception. Security researchers at Wallarm warn that this method capitalizes on the credibility of DocuSign to bypass detection.

Read More
1 min read
Hackers Claim Access to Nokia Data, Selling for $20K on Cybercrime Forum

Hackers allege they accessed Nokia’s internal systems through a third-party contractor, stealing sensitive data, including SSH keys and source code. The data is reportedly listed for $20,000 on BreachForums, with the hacker insisting that no customer information was compromised. Nokia has yet to address these claims.

Read More
1 min read