The Network Company Blog

We Keep you Connected

The Network Company Blog

Sticky Werewolf
Jun 10, 2024NewsroomCyber Espionage / Malware Cybersecurity researchers have disclosed details of a threat actor known as Sticky Werewolf that has been linked to cyber attacks targeting entities in Russia and Belarus. The phishing attacks were aimed at a pharmaceutical company, a Russian research institute dealing with microbiology and vaccine development, and the aviation sector, expanding beyond their initial focus of government organizations, Morphisec said in a report last week. “In previous campaigns, the infection
Microsoft Alters 'Recall' AI Feature for More Privacy
Microsoft is including untouched security features to appease broadly publicized considerations over its untouched “Recall” AI constituent. Some, although, nonetheless aren’t satisfied the corporate went a long way plenty. It’s now simply 8 days till Microsoft releases Recall, a untouched synthetic wisdom (AI)-driven program that can periodically whip, bind, and analyze screenshots of Copilot+ PCs as they’re being worn daily. Recall is meant to behave like one of those reminiscence store, permitting customers to right
Phishing Attack
Jun 10, 2024NewsroomPhishing Attack / Cybercrime Cybersecurity researchers have spotted a phishing attack distributing the More_eggs malware by masquerading it as a resume, a technique originally detected more than two years ago. The attack, which was unsuccessful, targeted an unnamed company in the industrial services industry in May 2024, Canadian cybersecurity firm eSentire disclosed last week. “Specifically, the targeted individual was a recruiter that was deceived by the threat actor into thinking they were a
Muhstik Botnet
Jun 06, 2024NewsroomBotnet / DDoS Attack The distributed denial-of-service (DDoS) botnet known as Muhstik has been observed leveraging a now-patched security flaw impacting Apache RocketMQ to co-opt susceptible servers and expand its scale. “Muhstik is a well-known threat targeting IoT devices and Linux-based servers, notorious for its ability to infect devices and utilize them for cryptocurrency mining and launching Distributed Denial of Service (DDoS) attacks,” Cloud security firm Aqua said in a report published this
AI
Some Generative AI Company Employees Pen Letter Wanting ‘Right to Warn’ About Risks
Some current and former employees of OpenAI, Google DeepMind and Anthropic published a letter on June 4 asking for whistleblower protections, more open dialogue about risks and “a culture of open criticism” in the major generative AI companies. The Right to Warn letter illuminates some of the inner workings of the few high-profile companies that sit in the generative AI spotlight. OpenAI holds a distinct status as a nonprofit trying to “navigate massive risks” of
Jun 06, 2024NewsroomSoftware Security / Data Theft Cybersecurity researchers have discovered a malicious Python package uploaded to the Python Package Index (PyPI) repository that’s designed to deliver an information stealer called Lumma (aka LummaC2). The package in question is crytic-compilers, a typosquatted version of a legitimate library named crytic-compile. The rogue package was downloaded 441 times before it was taken down by PyPI maintainers. “The counterfeit library is interesting in that, in addition [to] being
RansomHub Actors Exploit ZeroLogon Vuln in Recent Ransomware Attacks
In contemporary assaults involving the ominously rising RansomHub ransomware, attackers have exploited the so-called ZeroLogon flaw within the Home windows Netlogon Far flung Protocol from 2020 (CVE-2020-1472) to realize preliminary get right of entry to to a sufferer’s order. Previous to deploying the ransomware, the attackers have old a number of dual-use gear, together with far flung get right of entry to merchandise from firms like Atera and Splashtop and community scanners from NetScan amongst others,
Dashlane password manager user interface.
For the 2023 Specops Weak Password Report, researchers analyzed more than 800 million breached passwords and found that the most commonly breached passwords consisted of eight characters or less. Those containing only lowercase letters were the most common character combinations cracked by hackers, making up 18.82% of passwords used in attacks. Those cracked most were ‘password,’ ‘admin,’ ‘welcome’ and ‘p@ssw0rd.’ SEE: Keeper Password Manager Review: Features, Pros & Cons (TechRepublic) According to the report, 83%
Chinese Threat Clusters Triple-Team High-Profile Asian Government Org
Over the presen occasion, a trio of Chinese language state-aligned warning clusters collaborated to glean delicate army and political secrets and techniques from a high-profile executive group in Southeast Asia. A brandnew Sophos file highlights now not simply the sophistication of the so-called “Operation Crimson Palace” — involving brandnew malware gear, greater than 15 dynamic hyperlink library (DLL) sideloading efforts, and a few book evasion tactics — but in addition a notable stage of coordination.
Celebrity TikTok Accounts Compromised
Jun 05, 2024NewsroomCyber Attack / Online Security Popular video-sharing platform TikTok has acknowledged a security issue that has been exploited by threat actors to take control of high-profile accounts on the platform. The development was first reported by Semafor and Forbes, which detailed a zero-click account takeover campaign that allows malware propagated via direct messages to compromise brand and celebrity accounts without having to click or interact with it. It’s currently unclear how many users
Windows 10
  NurPhoto/Getty Images We all know that some perfectly good Windows 10 PCs can’t be upgraded to Windows 11. But did you know that Canalys Insights estimated there are 240 million Windows 10 PCs doomed to the trash heap because they can’t be upgraded to Windows 11 after Microsoft dumps Windows 10 support on October 14, 2025? Wow. That’s a lot of trashed PCs. And, it may be worse than that. By IT asset management
Cyber Attackers are Targeting Companies Associated With Paris Games
Organisations linked to the Paris Olympics 2024 have an increased risk of cyber attacks, including ransomware, credential leaks and phishing campaigns, a study has found. Insikt Group, the threat research division of security firm Recorded Future, has already observed posts advertising access to Games-related organisations in France and compromised credentials using “paris2024[dot]org” domains on the Dark Web. These findings were published in a new report highlighting high-priority threats to the Games, based on an assessment
Decoy Dog Trojan
Jun 04, 2024NewsroomCyber Attack / Malware Russian organizations are at the receiving end of cyber attacks that have been found to deliver a Windows version of a malware called Decoy Dog. Cybersecurity company Positive Technologies is tracking the activity cluster under the name Operation Lahat, attributing it to an advanced persistent threat (APT) group called HellHounds. “The Hellhounds group compromises organizations they select and gain a foothold on their networks, remaining undetected for years,” security
ChatGPT prompts for business
Creation ChatGPT Activates have change into a game-changer for companies taking a look to spice up their expansion and good fortune. By way of leveraging the facility of AI-generated activates, corporations can streamline communique, give a boost to productiveness, and pressure innovation. On this article, we can delve into some great benefits of the usage of ChatGPT Activates and the way they are able to propel your corporation to fresh heights. Advantages of ChatGPT Activates
Keeper password manager desktop interface.
For organizations with multiple online accounts, tightening company security should be a top priority to prevent data breaches or theft. The first step to avoiding a data breach is creating unique passwords for your accounts. But suppose you’re like many people who resort to reusing their old passwords to create new accounts. In that case, it’s safe to say that it’s only a matter of time before your data and online accounts are compromised. And

GET THE LATEST UPDATES, OFFERS, INFORMATION & MORE