Telecom giant Lumen suffered a ransomware attack and disclose a second incident

Telecommunications giant Lumen Technologies discovered two cybersecurity incidents, including a ransomware attack. In a filing to the Securities and Exchange Commission, on March 27, 2023, Lumen announced two cybersecurity incidents. One of the incidents is a ransomware attack that impacted a limited number of its servers that support a segmented hosting service. The company did […]

The post Telecom giant Lumen suffered a ransomware attack and disclose a second incident appeared first on Security Affairs.

What you need before the next vulnerability hits

Cyberattacks tend to come from two angles: criminals take advantage of employees with privileged access or of security weaknesses in your hardware/software infrastructure. These broad categories encompass attack vectors such as phishing, man-in-the-mid…

New MacStealer macOS malware appears in the cybercrime underground

A new MacStealer macOS malware allows operators to steal iCloud Keychain data and passwords from infected systems. Uptycs researchers team discovered a new macOS information stealer, called MacStealer, which allows operators to steal iCloud Keychain data and passwords from infected systems. The macOS malware can steal documents, credit card data, cookies from a victim’s browser […]

The post New MacStealer macOS malware appears in the cybercrime underground appeared first on Security Affairs.

Updates from the MaaS: new threats delivered through NullMixer

A technical analysis of NullMixer malware operation revealed Italy and France are the favorite European countries from the attackers’ perspective. Executive Summary Introduction During March 2023, we obtained information and data regarding an ongoing malware operation hitting more than 8.000 targets within a few weeks, with a particular emphasis on North American, Italian, and French […]

The post Updates from the MaaS: new threats delivered through NullMixer appeared first on Security Affairs.

Technical analysis of China-linked Earth Preta APT’s infection chain

China-linked Earth Preta cyberespionage group has been observed adopting new techniques to bypass security solutions. Trend Micro researchers reported that the China-linked Earth Preta group (aka Mustang Panda) is actively changing its tools, tactics, and procedures (TTPs) to bypass security solutions. Earth Preta, also known as “RedDelta” or “Bronze President,” has been active since at least […]

The post Technical analysis of China-linked Earth Preta APT’s infection chain appeared first on Security Affairs.

Malicious Python Package uses Unicode support to evade detection 

Researchers discovered a malicious package on PyPI that uses Unicode to evade detection while stealing sensitive data. Supply chain security firm Phylum discovered a malicious Python package on the Python Package Index (PyPI) repository that uses Unicode to evade detection and deliver information-stealing malware. The package, named onyxproxy, was uploaded to the PyPI repository on March […]

The post Malicious Python Package uses Unicode support to evade detection  appeared first on Security Affairs.

CISA to Start Issuing Early-Stage Ransomware Alerts

By Deeba Ahmed
According to CISA, this new initiative will be helpful for organizations/institutions in the public health, education, and government sectors.
This is a post from HackRead.com Read the original post: CISA to Start Issuing Early-Stage Ra…

New Backdoor Attack Uses Russian-Ukrainian Conflict Phishing Emails

By Deeba Ahmed
The backdoors used in this campaign are never-before-seen malware strains called CommonMagic and PowerMagic.
This is a post from HackRead.com Read the original post: New Backdoor Attack Uses Russian-Ukrainian Conflict Phishing Emails