admin

admin

North Korean Group Partners with Play Ransomware in Major Cyber Attack

Oct 30, 2024
Ransomware / Threat Intelligence

Threat actors associated with North Korea have been linked to a recent cyber incident involving the notorious Play ransomware, highlighting their financial motives. This activity, which took place between May and September 2024, is connected to a group known as Jumpy Pisces, also referred to as Andariel, APT45, DarkSeoul, Nickel Hyatt, Onyx Sleet (previously Plutonium), Operation Troy, Silent Chollima, and Stonefly. According to a new report from Palo Alto Networks’ Unit 42, “We have moderate confidence that Jumpy Pisces, or a segment of this group, is now collaborating with the Play ransomware collective.” This incident is particularly significant as it represents the first documented partnership between the Jumpy Pisces North Korean state-sponsored group and an underground ransomware operation. Active since at least 2009, Andariel is associated with North Korea’s Reconnaissance General Bureau (RGB) and has a history of deploying various cyber tactics.

Significant Cyber Attack Involves North Korean Collaboration with Play Ransomware Group October 30, 2024 In a notable development in the realm of cybersecurity, threat actors associated with North Korea have been identified as key players in a recent attack utilizing…

Dutch Investigators Attribute Hacks to Multiple Threat Actors

Critical Infrastructure Security, Cybercrime, Fraud Management & Cybercrime NCSC-NL Reports Citrix NetScaler Vulnerability Targeted Critical Infrastructure Akshaya Asokan (asokan_akshaya) • August 11, 2025 Dutch authorities indicate a suspected Russian hacking campaign utilized multiple groups to exploit a flaw in Citrix…

⚡ Weekly Highlights: Chrome Zero-Day, Ivanti Vulnerabilities, macOS Malware, Crypto Capers, and More

Jul 07, 2025
Cybersecurity / Hacking

In the realm of cybersecurity, everything may seem secure—until an overlooked detail lets danger in. Even robust systems can fail due to a simple oversight or a trusted tool’s misuse. Most threats don’t announce their presence; they creep in through overlooked vulnerabilities. A minor bug, a recycled password, a silent connection—these small oversights can lead to substantial risks.

Staying secure isn’t just about quick responses; it’s about identifying early indicators before they escalate into major issues. This week’s updates underscore their importance. From subtle strategies to unexpected intrusion points, the highlights below reveal how swiftly threats can proliferate—and what proactive teams are doing to stay ahead. Let’s get started.

⚡ Threat of the Week

U.S. Disrupts North Korean IT Worker Scheme
— Authorities have revealed that North Korean IT personnel infiltrated over 100 U.S. firms using fake or stolen identities. They not only collected salaries but also siphoned sensitive information and misappropriated virtual currency, with one incident involving over $900,000 targeting an unnamed blockchain company.

Weekly Cybersecurity Recap: Chrome 0-Day Exploit, Ivanti Vulnerabilities, MacOS Data Theft, and Cryptocurrency Heists Date: July 7, 2025 In the realm of cybersecurity, a false sense of security can be perilous. Even the most robust systems are vulnerable if a…

Microsoft Addresses 130 Vulnerabilities, Including Critical Issues in SPNEGO and SQL Server

July 9, 2025
Endpoint Security / Vulnerability

In its first Patch Tuesday update of 2025, Microsoft has rolled out fixes for 130 vulnerabilities, marking a shift as no exploited security flaws were included in this batch. Notably, one flaw addressed had already been publicly disclosed. The update also tackles 10 additional non-Microsoft CVEs impacting Visual Studio, AMD, and the Chromium-based Edge browser. Among the patched vulnerabilities, 10 are classified as Critical, while the remainder are deemed Important. “This marks the end of an 11-month streak of fixing at least one zero-day exploitation,” noted Satnam Narang, Senior Staff Research Engineer at Tenable. The vulnerabilities include 53 related to privilege escalation, 42 for remote code execution, 17 for information disclosure, and 8 for security feature bypasses. Furthermore, the update builds on two other flaws previously fixed in the Edge browser since the last month’s Patch Tuesday.

Microsoft Addresses 130 Vulnerabilities, Highlighting Critical Flaws in SPNEGO and SQL Server On July 9, 2025, Microsoft released its Patch Tuesday updates, addressing a total of 130 vulnerabilities, including critical security flaws within the SPNEGO protocol and SQL Server. Notably,…

Google Alerts Users to Actively Exploited CVE-2024-43093 Vulnerability in Android

November 5, 2024 – Mobile Security / Vulnerability

Google has issued a warning regarding a security vulnerability in its Android operating system that is currently being actively exploited. Identified as CVE-2024-43093, this privilege escalation flaw affects the Android Framework component and may allow unauthorized access to the “Android/data,” “Android/obb,” and “Android/sandbox” directories, along with their subdirectories. While details on the exploitation methods remain limited, Google noted in its monthly report that there are signs of “limited, targeted exploitation.” Additionally, the company highlighted CVE-2024-43047, a previously patched security issue in Qualcomm chipsets, which is also being actively exploited. This particular vulnerability involves a use-after-free flaw in the Digital Signal Processor (DSP) Service, where successful exploitation could lead to memory corruption.

Google Alerts Users to Actively Exploited CVE-2024-43093 Vulnerability in Android On November 5, 2024, Google issued a critical warning regarding a security vulnerability in the Android operating system, designated as CVE-2024-43093. This vulnerability involves privilege escalation within the Android Framework…

The Importance of Ongoing Red Teaming for AI Security

Artificial Intelligence & Machine Learning, Black Hat, Events NIST’s Apostol Vassilev Highlights the Importance of Dynamic Response Over Static Testing Michael Novinson (MichaelNovinson) • August 11, 2025 Apostol Vassilev, Research Team Supervisor, National Institute of Standards and Technology The expansion…

5 Identity-Based Vulnerabilities Behind Recent Retail Breaches

July 8, 2025
SaaS Security / Cyber Threats

From excessive admin privileges to neglected vendor tokens, attackers are capitalizing on weaknesses in trust and access. This article explores five significant retail breaches and the insights they provide. Major retailers like Adidas, The North Face, Dior, Victoria’s Secret, Cartier, Marks & Spencer, and Co-op have all faced breaches recently. Unlike traditional malware or zero-day exploits, these incidents were driven by identity exploitation—tapping into overprivileged access and unmonitored service accounts, often augmented by social engineering tactics.

Rather than forcing their way in, attackers simply logged in, moving stealthily through SaaS applications using legitimate credentials. Although many retailers have withheld specific technical details, clear patterns are emerging. Here’s a closer look at five notable breaches in the retail industry:

  1. Adidas: Leveraging third-party trust…

Identity-Based Attacks Compromising Retail: A Closer Look In recent months, the retail sector has faced significant security breaches, exposing vulnerabilities that often stem from identity-based attacks rather than sophisticated malware. Major brands such as Adidas, The North Face, Dior, Victoria’s…