Skip to content

Polymath Central

Thoughts and musings of David Greenberg, a polymath

Cybersecurity

INTERPOL Pushes for “Romance Baiting” to Replace “Pig Butchering” in Scam Discourse

December 18, 2024

INTERPOL is calling for a linguistic shift that aims to put to an end to the term “pig butchering,” instead advocating for the use of “romance baiting” to refer to…

Cybersecurity

Patch Alert: Critical Apache Struts Flaw Found, Exploitation Attempts Detected

December 18, 2024

Threat actors are attempting to exploit a recently disclosed security flaw impacting Apache Struts that could pave the way for remote code execution. The issue, tracked as CVE-2024-53677, carries a…

Cybersecurity

Meta Fined €251 Million for 2018 Data Breach Impacting 29 Million Accounts

December 18, 2024

Meta Platforms, the parent company of Facebook, Instagram, WhatsApp, and Threads, has been fined €251 million (around $263 million) for a 2018 data breach that impacted millions of users in…

Cybersecurity

Attackers Exploit Microsoft Teams and AnyDesk to Deploy DarkGate Malware

December 17, 2024

A new social engineering campaign has leveraged Microsoft Teams as a way to facilitate the deployment of a known malware called DarkGate. “An attacker used social engineering via a Microsoft…

Cybersecurity

Hackers Use Microsoft MSC Files to Deploy Obfuscated Backdoor in Pakistan Attacks

December 17, 2024

A new phishing campaign has been observed employing tax-themed lures to deliver a stealthy backdoor payload as part of attacks targeting Pakistan. Cybersecurity company Securonix, which is tracking the activity…

Cybersecurity

Even Great Companies Get Breached — Find Out Why and How to Stop It

December 17, 2024

Even the best companies with the most advanced tools can still get hacked. It’s a frustrating reality: you’ve invested in the right solutions, trained your team, and strengthened your defenses.…

Cybersecurity

Hackers Exploit Webview2 to Deploy CoinLurker Malware and Evade Security Detection

December 17, 2024

Bogus software update lures are being used by threat actors to deliver a new stealer malware called CoinLurker. “Written in Go, CoinLurker employs cutting-edge obfuscation and anti-analysis techniques, making it…

Cybersecurity

5 Practical Techniques for Effective Cyber Threat Hunting

December 17, 2024

Addressing cyber threats before they have a chance to strike or inflict serious damage is by far the best security approach any company can embrace. Achieving this takes a lot…

Cybersecurity

Bitter APT Targets Turkish Defense Sector with WmRAT and MiyaRAT Malware

December 17, 2024

A suspected South Asian cyber espionage threat group known as Bitter targeted a Turkish defense sector organization in November 2024 to deliver two C++-malware families tracked as WmRAT and MiyaRAT.…

Cybersecurity

CISA and FBI Raise Alerts on Exploited Flaws and Expanding HiatusRAT Campaign

December 17, 2024

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added two security flaws to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation in the wild. The…

Posts pagination

1 … 113 114 115 … 128

Polymath Central

Thoughts and musings of David Greenberg, a polymath

Proudly powered by WordPress | Theme: Newsup by Themeansar.