New Ransomware Family Deployed in Log4Shell Attacks

Recently a public exploit for the major zero-day vulnerability known as ‘Log4Shell’ in the Apache Log4j Java-based logging platform has been made available. Log4j is a development platform that enables…

Agent Tesla Spyware Used in Phishing Campaign

Agent Tesla initially detected in late 2014, is a known spyware aimed at collecting sensitive data from a victim’s device, such as stored application credentials and keyboard inputs (keylogger). Agent…

Most Recent iOS Updates from Apple Fix Remote Jailbreak Exploit for iPhones

Earlier this week, Apple announced security patches for various weaknesses in iOS, macOS, tvOS, and watchOS, including a remote jailbreak exploit chain and several critical flaws in the Kernel and…

Karakurt: Another Threat Actor Group on the Cyberthreat Landscape

Accenture’s team of researchers has identified a threat actor group dubbed Karakurt, as the group calls itself. The hacking gang was first discovered during the month of June this year.…

The Ransomware Attack Suffered by Kronos May Cause Weeks of Downtime

Kronos is a workforce management and human resources company that offers cloud-based solutions for timekeeping, payroll, employee benefits, analytics, and other tasks. Kronos merged with Ultimate Software in 2020 to…

French Users and Orgs Targeted by TinyNuke Info-Stealing Malware

According to security researchers, the TinyNuke banking malware (also known as Nukebot) has resurfaced in a new operation exclusively targeting French users and organizations with invoice-themed email lures. The targets…

All You Need to Know About the New Zero-Day Found in the Log4j Java Library

Log4j 2 is a Java logging library that is open source and extensively used in a variety of software applications and services throughout the world. The flaw gives threat actors…

The Use of Gift Cards as a Scam Payment Method Has Increased Dramatically, FTC Data Shows

According to the US Federal Trade Commission (FTC), customers across the country reported losing $148 million in scams where gift cards were used as a payment method. This amount is…

Volvo Cars Data Breach Results in Theft of Proprietary Information

A Volvo Cars data breach has been disclosed by the company itself, announcing in a post on the 10th of December that a limited amount of the R&D property was…

Hackers Use QR Codes to Steal Banking Credentials in Recent Phishing Attempts

Over the last few weeks, a new phishing operation focusing on e-banking users from Germany has been in progress, using QR codes during the credential-stealing operation. As explained by BleepingComputer,…