Category: Threat Intel Reports
-
How to Protect Your Environment From the NTLM Vulnerability
* [Endpoint Security](/endpoint-security)* [Сloud Security](/cloud-security)* [Vulnerabilities -& Threats](/vulnerabilities-threats)* [Cybersecurity Operations](/cybersecurity-operations)[![DR Technology Logo](https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt4c091cd3ac9935ea/653a71456ad0f6040a6f71bd/Dark_Reading_Logo_Technology_0.png?width=700&auto=webp&quality=80&disable=upscale ‘DR Technology Logo’)News, news analysis, and commentary on…
-
Strengthening open source: A roadmap to enhanced cybersecurity
Strengthening open source: A roadmap to enhanced cybersecurity==============================================================![](https://cdn.nextgov.com/media/img/cd/2024/12/10/GettyImages_519973294_1/860×394.jpg?1733862240) ![](https://cdn.nextgov.com/media/img/cd/2024/12/10/GettyImages_519973294_1/860×394.jpg?1733862240)Rudy Sulgan/Getty | Get the latest federal technology news delivered to your…
-
Authorities Arrested LockBit Ransomware Developer & Team Core Member
U.S. authorities have unveiled charges against Rostislav Panev, a dual Russian-Israeli national, for his alleged role as a key developer…
-
Nearly 6 million people were impacted by ransomware attack on Ascension Health
![Ascension](https://cms.therecord.media/uploads/format_webp/small_Ascension_7407fff6fd.jpg?w=3840)Image: Ascension St. Vincent Anderson hospital in Indiana is part of a network impacted by a cybersecurity incident. Credit: Ascension…
-
Judge rules NSO Group is liable for spyware hacks targeting 1,400 WhatsApp user devices
![NSO Group](https://cms.therecord.media/uploads/small_NSO_GROUP_9c245ee01a.webp?w=3840) [Suzanne Smalley](/author/suzanne-smalley)December 21st, 2024 Judge rules NSO Group is liable for spyware hacks targeting 1,400 WhatsApp user devices=======================================================================================The…
-
Now You See Me, Now You Dont: Using LLMs to Obfuscate Malicious JavaScript
This article discusses an adversarial machine learning algorithm that uses large language models (LLMs) to generate novel variants of malicious…
-
BellaCPP: Discovering a new BellaCiao variant written in C++
A new C++ variant of the BellaCiao malware, dubbed BellaCPP, has been discovered by researchers. This variant shares similarities with…
-
Rspack npm Packages Compromised with Crypto Mining Malware in Supply Chain Attack
Two npm packages, @rspack/core and @rspack/cli, were compromised in a supply chain attack, allowing the publication of malicious versions containing…
-
Recent Cases of Watering Hole Attacks, Part 1
This analysis focuses on a watering hole attack targeting a Japanese university research laboratory website in 2023. The attack used…
-
Threat Actors Hijack Misconfigured Servers for Live Sports Streaming
Aqua Nautilus researchers uncovered a new attack vector where threat actors exploit misconfigured JupyterLab and Jupyter Notebook applications to hijack…