Dark Reading

Cowbell Secures $60 Million Series C Funding From Zurich Insurance Group

This investment will allow Cowbell to expand its operations, enter key global markets, enhance cyber resilience services, introduce innovative products, and strengthen partnerships.

Targeted PyPI Package Steals Google Cloud Credentials from macOS Devs

The malware is designed to target only 64 specific machines, attempting to exfiltrate Google Cloud Platform credentials for potential follow-on attacks such as data theft and malware implantation.

'Stargazer Goblin' Amasses Thousands of Rogue GitHub Accounts to Spread Malware

Stargazer Goblin has been distributing various malware families like Atlantida Stealer, Lumma, and Rhadamanthys, since at least August 2022. The threat actor charges users to "star" repositories with fake accounts, increasing their credibility.

Pro-Palestinian Actor Levels Six-Day DDoS Attack on UAE Bank

BlackMeta, known for targeting organizations in Israel, UAE, and the US, used a cybercrime service called InfraShutdown to target a UAE bank for $500-$625 a week. The attach lasted 100 hours in total.

Well-Established Cybercriminal Ecosystem Blooms in Iraq

Researchers have uncovered a well-established cybercriminal ecosystem connected to a Telegram bot, with over 90,000 Arabic messages dating back to 2022, enabling a sophisticated network offering social media manipulation and financial theft services.

SEXi Ransomware Rebrands as 'APT Inc.,' Retains Prior Extortion Tactics

The cybercrime group known as SEXi ransomware, now operating as APT Inc., has been targeting organizations since February. They use a leaked Babuk encryptor for VMware ESXi servers and LockBit 3 encryptor for Windows servers.

Credential-Stealing OSS 'Crystalray' Attacks Jump 10X

Crystalray's attack chain involves using various OSS tools for reconnaissance, scanning, and exploiting vulnerabilities. The group was first discovered in February using the "SSH-Snake" tool to exploit vulnerabilities in Atlassian Confluence.

Passkey Redaction Attacks Subvert GitHub, Microsoft Authentication

Online accounts are increasingly protected by passkey technology, but many platforms like banking, e-commerce, social media, and software development can still be compromised using adversary-in-the-middle (AitM) attacks.

Apple CocoaPods Bugs Expose Millions of Apps to Code Injection

A report by E.V.A Information Security reveals that Apple's popular dependency manager, CocoaPods, has been plagued with three critical vulnerabilities for several years.

Your Phone's 5G Connection Is Vulnerable to Bypass, DoS Attacks

One attack involves setting up a fake base station using a Raspberry Pi or a software-defined radio (SDR). These devices can imitate a real base station and are readily available for purchase.

Defend Against Threats with Cyber Fusion

Cyware is the leading provider of cyber fusion solutions that power threat intelligence sharing , end-to-end automation and 360-degree threat response.

Trending Tags