admin

Cybercriminals Targeting Godot Game Engine Users with Cross-Platform Malware

Cybercriminals Targeting Godot Game Engine Users with Cross-Platform Malware

Understanding GodLoader Malware Campaign Targeting Godot Engine The Godot Engine, a popular open-source game development platform, has been exploited in a recent malware campaign known as GodLoader. Since June 2024, over 17,000 systems have been impacted. Cybercriminals have misused this game engine to execute harmful GDScript code. This code triggers malicious commands, delivering malware to…

Read More
T-Mobile Unveils Intrusion Attempts on Network by Wireline Provider

T-Mobile Unveils Intrusion Attempts on Network by Wireline Provider

T-Mobile Detects Attempts to Breach Its Systems In recent weeks, T-Mobile detected attempts made by bad actors to infiltrate its systems. Fortunately, the U.S. telecom service provider stated that no sensitive data was accessed during these intrusion attempts. Jeff Simon, T-Mobile's chief security officer, confirmed that these attempts originated from a wireline provider's network connected…

Read More
Izjava zlonamernih hekerjev o razkritju podatkovnega vdora - nasveti varnosti IT.

Izjava zlonamernih hekerjev o razkritju podatkovnega vdora – nasveti varnosti IT.

Kršitev kibernetske varnosti, ki je po poročilih razkrila več kot 800.000 zapisov, je sprožila resne pomisleke glede varnosti osebnih in finančnih podatkov, ki jih hrani podjetje. Kibernetska varnost v današnjem svetu postaja vse bolj pomembna, še posebej ob takih incidentih. Po poročanjih naj bi razkriti podatki vsebovali imena, e-poštne naslove in druge občutljive informacije uporabnikov,…

Read More
"Unveiling the First UEFI Bootkit Targeting Linux Kernels: Meet Bootkitty"

“Unveiling the First UEFI Bootkit Targeting Linux Kernels: Meet Bootkitty”

Understanding the Bootkitty: A Revolutionary UEFI Bootkit for Linux Recent discoveries in cybersecurity have revealed a groundbreaking threat: the Bootkitty, the first Unified Extensible Firmware Interface (UEFI) bootkit specifically designed for Linux systems. This troubling development was created by a group known as BlackCat. Although researchers describe Bootkitty as a proof-of-concept (PoC), there’s currently no…

Read More
Researchers Discover Bootkitty: The Ultimate Threat to Linux Kernels

Researchers Discover Bootkitty: The Ultimate Threat to Linux Kernels

Understanding Bootkitty: The First Linux UEFI Bootkit Cybersecurity researchers have recently disclosed important findings about Bootkitty, a groundbreaking UEFI bootkit specifically designed for Linux systems. This bootkit, created by a group calling itself BlackCat, is noted as the first of its kind. Although currently assessed as a proof-of-concept (PoC), it has not yet been observed…

Read More
How to Defend Against APT-C-60 Exploiting WPS Office Vulnerability

How to Defend Against APT-C-60 Exploiting WPS Office Vulnerability

APT-C-60 Cyber Attack: A Closer Look APT-C-60 has emerged as a significant threat actor in recent cyber attacks, notably targeting an organization in Japan. This attack utilized a job application-themed lure to deliver the SpyGlace backdoor, raising alarms across the cybersecurity community. According to findings from JPCERT/CC, the incident occurred around August 2024. Incident Overview…

Read More
INTERPOL Busts African Cybercrime: 1,006 Arrests, 134,089 Malicious Networks Dismantled

INTERPOL Busts African Cybercrime: 1,006 Arrests, 134,089 Malicious Networks Dismantled

INTERPOL's Serengeti Operation: A Major Blow to Cybercrime in Africa In late 2024, INTERPOL launched an unprecedented operation named Serengeti, resulting in the arrest of 1,006 suspects across 19 African nations. This significant effort aimed to disrupt various cybercrime activities, including ransomware attacks and business email compromise schemes. In total, law enforcement agencies dismantled an…

Read More
Matrix Botnet Exploits IoT Devices for Massive DDoS Attacks

Matrix Botnet Exploits IoT Devices for Massive DDoS Attacks

Matrix Botnet Targets IoT Vulnerabilities A threat actor known as Matrix is behind a significant distributed denial-of-service (DoS) campaign targeting Internet of Things (IoT) devices. By exploiting vulnerabilities and misconfigurations, Matrix has successfully co-opted these devices to create a disruptive botnet. This operation has become a one-stop shop for scanning, exploiting weaknesses, deploying malware, and…

Read More