‘Fog’ Hackers Troll Victims With DOGE Ransom Notes
Since January, threat actors distributing the malware have notched up more than 100 victims.
Since January, threat actors distributing the malware have notched up more than 100 victims.
A critical vulnerability in the trust model of Cursor, a fast-growing tool for LLM-assisted development, allows for silent and persistent remote code execution.
Fortra strengthens its endpoint-to-cloud security platform with the acquisition of Lookout’s cloud application security broker, zero trust network access, and secure web gateway technologies.
Two critical vulnerabilities affect the security vendor’s management console, one of which is under active exploitation. The company has updated cloud-based products but won’t have a patch for its on-premises version until mid-August.
Cybersecurity researchers have discovered a cybercrime campaign that’s using malvertising tricks to direct victims to fraudulent sites to deliver a new information stealer called TamperedChef. “The objective is to lure victims into downloading and installing a trojanized PDF editor, which includes an information-stealing malware dubbed TamperedChef,” Truesec researchers Mattias Wåhlén, Nicklas
Three international vehicle manufacturers have fallen to supply chain cyberattacks in the past month alone.
Organizations that stay ahead of attacks won’t be the most compliant ones — they’ll be the ones most honest about what actually works.