Category Security

T-Mobile Claims Salt Typhoon Did Not Access Customer Data

A notorious Chinese hacking group that breached several US telecoms providers was repelled by T-Mobile’s cyber-defenses before being able to access any sensitive customer information, the firm’s CSO, Jeff Simon, has claimed. Simon clarified in a blog post on November…

Mimic Ransomware: What You Need To Know

What is Mimic? Mimic is family of ransomware, first found in-the-wild in 2022. In common with many other ransomware attacks, Mimic encrypts a victim’s files, and demands a ransom payment in cryptocurrency for the release of a decryption key. Does…

GodLoader Malware Infects Thousands via Game Development Tools

A new cyber-attack technique leveraging the Godot Gaming Engine to execute undetectable malware has been reported by Check Point Research. Using maliciously crafted GDScript code, threat actors deployed malware via “GodLoader,” bypassing most antivirus detections and infecting over 17,000 devices since June…

Malicious Actors Exploit ProjectSend Critical Vulnerability

Public-facing instances of ProjectSend, an open-source file-sharing web application, have been exploited by attackers, according to vulnerability intelligence provider VulnCheck. ProjectSend was created by software developer Ignacio Nelson and is maintained by a group of over 50 people. It has…

From Logs to Runtime Protection

Nov 28, 2024The Hacker NewsCloud Security / Threat Detection Serverless environments, leveraging services such as AWS Lambda, offer incredible benefits in terms of scalability, efficiency, and reduced operational overhead. However, securing these environments is extremely challenging. The core of current…