Cybersecurity

Microsoft Uncovers New XCSSET macOS Malware Variant with Advanced Obfuscation Tactics 

Microsoft Uncovers New XCSSET macOS Malware Variant with Advanced Obfuscation Tactics 

Microsoft said it has discovered a new variant of a known Apple macOS malware called XCSSET as part of limited attacks in the wild.
“Its first known variant since 2022, this latest XCSSET malware features enhanced obfuscation methods, updated persistence mechanisms, and new infection strategies,” the Microsoft Threat Intelligence team said in a post shared on X.
“These enhanced features add to

South Korea Suspends DeepSeek AI Downloads Over Privacy Violations 

South Korea Suspends DeepSeek AI Downloads Over Privacy Violations 

South Korea has formally suspended new downloads of Chinese artificial intelligence (AI) chatbot DeepSeek in the country until the service makes changes to its mobile apps to comply with data protection regulations.
Downloads have been paused as of February 15, 2025, 6:00 p.m. local time, the Personal Information Protection Commission (PIPC) said in a statement. The web service remains

CISO’s Expert Guide To CTEM And Why It Matters 

CISO’s Expert Guide To CTEM And Why It Matters 

Cyber threats evolve—has your defense strategy kept up? A new free guide available here explains why Continuous Threat Exposure Management (CTEM) is the smart approach for proactive cybersecurity.
This concise report makes a clear business case for why CTEM’s comprehensive approach is the best overall strategy for shoring up a business’s cyber defenses in the face of evolving attacks. It also

⚡ THN Weekly Recap: Google Secrets Stolen, Windows Hack, New Crypto Scams and More 

⚡ THN Weekly Recap: Google Secrets Stolen, Windows Hack, New Crypto Scams and More 

Welcome to this week’s Cybersecurity News Recap. Discover how cyber attackers are using clever tricks like fake codes and sneaky emails to gain access to sensitive data. We cover everything from device code phishing to cloud exploits, breaking down the technical details into simple, easy-to-follow insights.
⚡ Threat of the Week
Russian Threat Actors Leverage Device Code Phishing to Hack

New Golang-Based Backdoor Uses Telegram Bot API for Evasive C2 Operations 

New Golang-Based Backdoor Uses Telegram Bot API for Evasive C2 Operations 

Cybersecurity researchers have shed light on a new Golang-based backdoor that uses Telegram as a mechanism for command-and-control (C2) communications.
Netskope Threat Labs, which detailed the functions of the malware, described it as possibly of Russian origin.
“The malware is compiled in Golang and once executed it acts like a backdoor,” security researcher Leandro Fróes said in an analysis

Android’s New Feature Blocks Fraudsters from Sideloading Apps During Calls 

Android’s New Feature Blocks Fraudsters from Sideloading Apps During Calls 

Google is working on a new security feature for Android that blocks device owners from changing sensitive settings when a phone call is in progress.
Specifically, the in-call anti-scammer protections include preventing users from turning on settings to install apps from unknown sources and granting accessibility access. The development was first reported by Android Authority.
Users who attempt

New “whoAMI” Attack Exploits AWS AMI Name Confusion for Remote Code Execution 

New “whoAMI” Attack Exploits AWS AMI Name Confusion for Remote Code Execution 

Cybersecurity researchers have disclosed a new type of name confusion attack called whoAMI that allows anyone who publishes an Amazon Machine Image (AMI) with a specific name to gain code execution within the Amazon Web Services (AWS) account.
“If executed at scale, this attack could be used to gain access to thousands of accounts,” Datadog Security Labs researcher Seth Art said in a report

Lazarus Group Deploys Marstech1 JavaScript Implant in Targeted Developer Attacks 

Lazarus Group Deploys Marstech1 JavaScript Implant in Targeted Developer Attacks 

The North Korean threat actor known as the Lazarus Group has been linked to a previously undocumented JavaScript implant named Marstech1 as part of limited targeted attacks against developers.
The active operation has been dubbed Marstech Mayhem by SecurityScorecard, with the malware delivered by means of an open-source repository hosted on GitHub that’s associated with a profile named “

AI-Powered Social Engineering: Ancillary Tools and Techniques 

AI-Powered Social Engineering: Ancillary Tools and Techniques 

Social engineering is advancing fast, at the speed of generative AI. This is offering bad actors multiple new tools and techniques for researching, scoping, and exploiting organizations. In a recent communication, the FBI pointed out: ‘As technology continues to evolve, so do cybercriminals’ tactics.’
This article explores some of the impacts of this GenAI-fueled acceleration. And examines what

Microsoft: Russian-Linked Hackers Using ‘Device Code Phishing’ to Hijack Accounts 

Microsoft: Russian-Linked Hackers Using ‘Device Code Phishing’ to Hijack Accounts 

Microsoft is calling attention to an emerging threat cluster it calls Storm-2372 that has been attributed to a new set of cyber attacks aimed at a variety of sectors since August 2024.
The attacks have targeted government, non-governmental organizations (NGOs), information technology (IT) services and technology, defense, telecommunications, health, higher education, and energy/oil and gas

CALL US TODAY TO SPEAK TO A SECURITY EXPERT: 720.221.6804

X