Google announced patches for over 40 vulnerabilities as part of Android’s November 2024 security update, including two flaws that have been actively exploited. The first, tracked as CVE-2024-43047, was disclosed last month after evidence of in-the-wild exploitation was found by Amnesty International and Google’s Threat Analysis Group (TAG).
Read MoreNewpark Resources, a Texas-based oilfield supplier, recently reported a ransomware attack that impacted its information systems and business applications. The company detected the breach on October 29 and responded by initiating a cybersecurity response plan.
Read MoreCybersecurity researchers at Socket Security have discovered a malicious Python package called "Fabrice" on PyPI, which has been covertly stealing AWS credentials from developers for three years.
Read MoreThe Androxgh0st botnet, which initially targeted web servers, has evolved by integrating components from the Mozi botnet, a notorious malware that primarily infects IoT devices. According to CloudSEK researchers, this integration allows Androxgh0st to expand its reach, leveraging Mozi’s payloads and propagation mechanisms to infect a wider array of IoT devices.
Read MoreNorth Korean hackers, specifically the BlueNoroff group, are targeting macOS users with a sophisticated phishing campaign that uses fake cryptocurrency-related PDFs. The attackers are sending emails with malicious links disguised as PDFs on topics such as Bitcoin price surges and decentralized finance (DeFi).
Read MoreSchneider Electric is investigating a breach after hackers, known as Hellcat, claimed to have stolen sensitive data from its Jira issue tracking system.
Read MoreOperation Synergia II, a global cybercrime crackdown, resulted in the takedown of over 22,000 IP addresses linked to phishing, ransomware, and infostealer attacks.
Read MoreA ransomware attack in July 2024 targeted the City of Columbus, Ohio, resulting in the theft of personal information from 500,000 residents. The breach exposed sensitive data, including names, bank accounts, and Social Security numbers.
Read MoreCybercriminals are leveraging DocuSign’s APIs to send realistic phishing invoices that evade spam filters by appearing to originate from legitimate DocuSign accounts. This technique allows attackers to target users with fake invoices from trusted platforms like Norton, increasing the risk of deception. Security researchers at Wallarm warn that this method capitalizes on the credibility of DocuSign to bypass detection.
Read MoreHackers allege they accessed Nokia’s internal systems through a third-party contractor, stealing sensitive data, including SSH keys and source code. The data is reportedly listed for $20,000 on BreachForums, with the hacker insisting that no customer information was compromised. Nokia has yet to address these claims.
Read More