Monthly Archives: April 2024

10-Year-Old ‘RUBYCARP’ Romanian Hacker Group Surfaces with Botnet

A threat group of suspected Romanian origin called RUBYCARP has been observed maintaining a long-running botnet for carrying out crypto mining, distributed denial-of-service (DDoS), and phishing attacks. The group, believed to be active for at least 10 years, employs the botnet for financial gain, Sysdig said in a report shared with The Hacker News. “Its primary method […]

Hackers Targeting Human Rights Activists in Morocco and Western Sahara

Human rights activists in Morocco and the Western Sahara region are the targets of a new threat actor that leverages phishing attacks to trick victims into installing bogus Android apps and serve credential harvesting pages for Windows users. Cisco Talos is tracking the activity cluster under the name Starry Addax, describing it as primarily singling out activists associated […]

Google to introduce Google Vids + 4 other workspace tools tomorrow at Cloud Next ’24

Google Workspace unveiled a set of Workspace announcements from Google Cloud Next ’24. Here’s a breakdown of the key announcements: Google Vids: A new AI-powered application called Vids is being introduced. Vids assists users in generating storyboards, selecting styles, and editing drafts for video content. It also offers pre-recorded voiceovers and facilitates secure project collaboration and […]

Researchers Discover LG Smart TV Vulnerabilities Allowing Root Access

Multiple security vulnerabilities have been disclosed in LG webOS running on its smart televisions that could be exploited to bypass authorization and gain root access on the devices. The findings come from Romanian cybersecurity firm Bitdefender, which discovered and reported the flaws in November 2023. The issues were fixed by LG as part of updates […]

Powerful Cloud Permissions You Should Know: Part 2

Originally published by Sonrai Security.Written by Tally Shea and Deirdre Hennigar.MITRE ATT&CK Framework: PersistenceThis blog is the second publication in a series exploring the most powerful cloud permissions and how they map to the MITRE ATT&CK Framework. If you have not yet read the first blog on the Initial Access stage, you can find it […]