Skip to content

Polymath Central

Thoughts and musings of David Greenberg, a polymath

Cybersecurity

Google Exposes GLASSBRIDGE: A Pro-China Influence Network of Fake News Sites

November 23, 2024

Government agencies and non-governmental organizations in the United States have become the target of a nascent China state threat actor known as Storm-2077. The adversary, believed to be active since…

Cybersecurity

China-Linked TAG-112 Targets Tibetan Media with Cobalt Strike Espionage Campaign

November 22, 2024

A China-linked nation-state group called TAG-112 compromised Tibetan media and university websites in a new cyber espionage campaign designed to facilitate the delivery of the Cobalt Strike post-exploitation toolkit for…

Cybersecurity

APT-K-47 Uses Hajj-Themed Lures to Deliver Advanced Asyncshell Malware

November 22, 2024

The threat actor known as Mysterious Elephant has been observed using an advanced version of malware called Asynshell. The attack campaign is said to have used Hajj-themed lures to trick…

Cybersecurity

Unlocking Google Workspace Security: Are You Doing Enough to Protect Your Data?

November 22, 2024

Google Workspace has quickly become the productivity backbone for businesses worldwide, offering an all-in-one suite with email, cloud storage and collaboration tools. This single-platform approach makes it easy for teams…

Cybersecurity

Russian Hackers Deploy HATVIBE and CHERRYSPY Malware Across Europe and Asia

November 22, 2024

Threat actors with ties to Russia have been linked to a cyber espionage campaign aimed at organizations in Central Asia, East Asia, and Europe. Recorded Future’s Insikt Group, which has…

Cybersecurity

Microsoft, Meta, and DOJ Disrupt Global Cybercrime and Fraudulent Networks

November 22, 2024

Meta Platforms, Microsoft, and the U.S. Department of Justice (DoJ) have announced independent actions to tackle cybercrime and disrupt services that enable scams, fraud, and phishing attacks. To that end,…

Cybersecurity

PyPI Attack: ChatGPT, Claude Impersonators Deliver JarkaStealer via Python Libraries

November 22, 2024

Cybersecurity researchers have discovered two malicious packages uploaded to the Python Package Index (PyPI) repository that impersonated popular artificial intelligence (AI) models like OpenAI ChatGPT and Anthropic Claude to deliver…

Cybersecurity

Chinese APT Gelsemium Targets Linux Systems with New WolfsBane Backdoor

November 21, 2024

The China-aligned advanced persistent threat (APT) actor known as Gelsemium has been observed using a new Linux backdoor dubbed WolfsBane as part of cyber attacks likely targeting East and Southeast…

Cybersecurity

Warning: Over 2,000 Palo Alto Networks Devices Hacked in Ongoing Attack Campaign

November 21, 2024

As many as 2,000 Palo Alto Networks devices are estimated to have been compromised as part of a campaign abusing the newly disclosed security flaws that have come under active…

Cybersecurity

10 Most Impactful PAM Use Cases for Enhancing Organizational Security

November 21, 2024

Privileged access management (PAM) plays a pivotal role in building a strong security strategy. PAM empowers you to significantly reduce cybersecurity risks, gain tighter control over privileged access, achieve regulatory…

Posts pagination

1 … 132 133 134 … 140

Polymath Central

Thoughts and musings of David Greenberg, a polymath

Proudly powered by WordPress | Theme: Newsup by Themeansar.