Researchers unearth two previously unknown Linux backdoors – Help Net Security

These tools are designed to maintain persistent access and execute commands stealthily, enabling prolonged intelligence gathering while evading detection.

Single Right-Click Let Hackers Gain Access To System By Exploiting 0-Day

This 0-day flaw, identified by security analysts at ClearSky Cyber Security in June 2024, allows attackers to gain unauthorized access to systems through minimal user interaction.

How To Find Listening Ports With Netstat and PowerShell

The netstat command in Windows is a useful tool for IT and Cyber professionals for tracing connections to computers. https://mshub.co.uk/find-listening-ports-netstat-and-powershell/#:~:text=To%20narrow%20down%20the%20output,often%20more%20useful%20for%20analysis.

Microsoft warns of ransomware attacks on US healthcare | CSO Online

The threat actor borrowed initial access from a third-party infection to effect lateral movement within the victim system and place INC encryption on their network.

6 things hackers know that they don’t want security pros to know that they know | CSO Online

“Hackers know that the average CISO has a lot on their plates and they don’t have enough [resources] to get everything done.

Unpatchable 0-day in surveillance cam is being exploited to install Mirai | Ars Technica

Akamai said that the attackers are exploiting the vulnerability so they can install a variant of Mirai, which arrived in September 2016 when a botnet of infected devices took down cybersecurity news site Krebs on Security.

Watch out — those movie downloads could actually just be vicious new Windows malware | TechRadar

Be careful when looking for pirated movies online – experts have warners many files are out there just to infect your Windows PCs with dangerous malware and infostealers.

The cyberattack cycle: First comes outage, next comes phishing

Threat Actors are quick to try to take advantage of tech issues, much in the same way “repair scammers” jump in after storms cause damage at homes. https://www.securityintelligence.com/news/cyberattack-cycle-first-outage-then-phishing/

FBI takes down ransomware gang that hacked dozens of companies | TechCrunch

The FBI said the Radar/Dispossessor group, led by a ringleader named “Brain,” would exploit security flaws in a victim company’s systems, steal vast amounts of data and scramble the company’s data with encryption.

Ransomware gang targets IT workers with new SharpRhino malware

Hunters International’s new tactic of deploying websites to impersonate legitimate open-source network scanning tools indicates that they are targeting IT workers in the hopes of breaching accounts with elevated privileges.