North Korean Lazarus hackers launch large-scale cyberattack by cloning open source software

Lazarus was seen poisoning open source software with infostealersThe campaign is dubbed Phantom Circuit, and targets mostly European software devsMultiple repositories were found poisoned with malwareThe notorious North Korean hackers…

Continue ReadingNorth Korean Lazarus hackers launch large-scale cyberattack by cloning open source software

If your business data appears on the dark web, get ready to face a cyberattack

Organizations with dark web exposure are more vulnerable, report warnsCompromised accounts and market listings double cyber breach risksCumulative dark web sources elevate organizational cybersecurity threatsA study by Searchlight Cyber in…

Continue ReadingIf your business data appears on the dark web, get ready to face a cyberattack

Google forced to step up phishing defenses following ‘most sophisticated attack’ it has ever seen

A new phishing scam has targeted a Google programmerThe attack was worryingly convincing, and has made Google tighten defenses in responseNot sure how to spot a phishing scam? Follow our…

Continue ReadingGoogle forced to step up phishing defenses following ‘most sophisticated attack’ it has ever seen

Businesses are struggling to address vulnerabilities hidden in phantom dependencies

Hidden dependencies pose unseen risks in modern software systems, says reportFunction-level analysis slashes unnecessary vulnerability fixes by 90%Advisory delays leave systems exposed to potential exploitationsAs organizations increasingly rely on third-party…

Continue ReadingBusinesses are struggling to address vulnerabilities hidden in phantom dependencies