China-Nexus Actors Weaponize ‘Nezha’ Open Source Tool – Dark Reading
A threat actor is putting a spin on classic remote monitoring and management (RMM) attacks, using a Chinese open source tool instead. – Read More
A threat actor is putting a spin on classic remote monitoring and management (RMM) attacks, using a Chinese open source tool instead. – Read More
Threat actors with suspected ties to China have turned a legitimate open-source monitoring tool called Nezha into an attack weapon, using it to deliver a known malware called Gh0st RAT…
Wanna work for a hot brand? Cyberattackers continue to evolve lures for job seekers in an impersonation campaign aimed at stealing resumes from social media pros. – Read More
China-affiliated hackers have quietly turned a once-benign open-source network monitoring tool into a remote access beacon. According to new findings from cybersecurity firm Huntress, the attackers used log poisoning and…
Three prominent ransomware groups DragonForce, LockBit, and Qilin have announced a new strategic ransomware alliance, once underscoring continued shifts in the cyber threat landscape. The coalition is seen as an…
Salesforce has announced two new AI agents operating on its Agentforce platform: one agent that monitors activity, detects anomalies, and accelerates investigations and remediations in the Salesforce Security Center; and…
Every year, weak passwords lead to millions in losses — and many of those breaches could have been stopped. Attackers don’t need advanced tools; they just need one careless login.…
Cybersecurity researchers have disclosed details of a now-patched vulnerability in the popular figma-developer-mcp Model Context Protocol (MCP) server that could allow attackers to achieve code execution. The vulnerability, tracked as…
Rising operational costs, growing client expectations for value and transparency, and economic uncertainty have left many firms questioning how best to adapt. The post Tech over cuts: How UK law…
As a freelance solicitor specialising in vehicle damage claims, Kevin Smith knew that efficiency was going to either make or break his practice. The post Kevin Smith’s story: Customising Hoowla…
£250 A former personal assistant at Walker Morris has been barred from the legal profession after keeping staff donations intended to fund a colleague’s honeymoon. The Solicitors Regulation Authority (SRA)…
Effing and blinding A barrister has been reprimanded by a bar disciplinary tribunal after making inappropriate comments to probation staff in a case where he had been instructed by the…
OpenAI on Tuesday said it disrupted three activity clusters for misusing its ChatGPT artificial intelligence (AI) tool to facilitate malware development. This includes a Russian‑language threat actor, who is said…
AI agents are now hacking computers. They’re getting better at all phases of cyberattacks, faster than most of us expected. They can chain together different aspects of a cyber operation,…
How organisations can improve their ability to both detect and discover cyber threats. – Read More