Malicious Go Modules: Trojan Threats Targeting Linux and macOS Computers

Malicious Go Modules: Trojan Threats Targeting Linux and macOS Computers

Overview Security experts have uncovered a significant cyber threat aimed at the Go programming community. Recent investigations reveal that several fake Go modules, posing as popular Go libraries, are being used to infect Linux and macOS systems with loader malware. This ongoing campaign targets…


0 Comments5 Minutes

Brute-Force Assault on 4K ISPs | Double-Check Your Passwords

Brute-Force Assault on 4K ISPs | Double-Check Your Passwords

A group of unknown cybercriminals has been targeting internet service providers in China and on the West Coast of the United States. Their goal is to infect systems with malware that steals data and mines cryptocurrency. These operations have been uncovered by researchers at the Splunk Threat…


0 Comments3 Minutes

This PolarEdge Trojan Turns Devices Into Remote Attack Tools

This PolarEdge Trojan Turns Devices Into Remote Attack Tools

Overview of the Attack A new botnet, named "PolarEdge," has been identified as targeting devices from brands like Cisco, ASUS, QNAP, and Synology since late 2023. French cybersecurity company Sekoia recently uncovered the threat, which is exploiting a critical vulnerability (CVE-2023-20118)…


0 Comments5 Minutes

This Ransomware Gang Could Lock Your Files and Steal Millions

This Black Basta Ransomware Locks Your Files and Steals Millions

A massive leak of internal chat logs from the notorious ransomware group Black Basta has exposed their operations, internal conflicts, and tactics. The logs, spanning over a year, were published online, offering a rare glimpse into the workings of one of the most dangerous cybercriminal groups. You…


0 Comments4 Minutes

This LightSpy Malware Steals Your Social Media Info

This LightSpy Malware Steals Your Social Media Info

What is LightSpy? LightSpy is a dangerous spyware program that can infect Windows, macOS, and Apple devices. First discovered in 2020 targeting users in Hong Kong, it has since evolved into a more powerful tool for cybercriminals. You might be interested in: RansomHub Leads Ransomware Attacks in…


0 Comments4 Minutes

Massive $1.5B Crypto Theft Shocks Market

Massive $1.5B Crypto Theft Shocks Market

Massive $1.5B Crypto Theft Shakes Cryptocurrency Exchange In what experts believe is the biggest digital heist ever, $1.5B Crypto Theft (£1.2 billion) from the cryptocurrency exchange Bybit. The Dubai-based platform has now called on top cybersecurity experts to help recover the stolen funds. You…


0 Comments4 Minutes

RansomHub Leads Ransomware Attacks in 2024

RansomHub's Increasing Global Impact In recent reports, experts have highlighted the rise of the RansomHub ransomware-as-a-service (RaaS) group, which has been utilizing flaws in the Netlogon protocol and Microsoft Active Directory to escalate privileges and gain unauthorized access to victim…


0 Comments5 Minutes

Trojans Games Mine Cryptocurrency

Game Download Trojans Launch Crypto Attack

A hidden cryptocurrency miner was secretly installed on some Windows servers. The attackers tricked users looking for popular games into downloading fake installers that contained this malware. You might be interested in: Understanding the Security Operations Center When users searched for…


0 Comments3 Minutes

Challenges of Implementing a Security Operations Center (SOC)

Understanding the Security Operations Center

How a Security Operations Center Stopped a Devastating Cyber Attack At 3:17 AM on a quiet Thursday, the security team at a mid-sized financial firm received an alert from their Security Operations Center (SOC). Anomalous activity had been detected—an employee’s credentials were being used to access…


0 Comments6 Minutes

FINALDRAFT Spyware Targets Windows and Linux Systems

Overview of the Threat Cybersecurity experts have uncovered a new hacking campaign targeting the foreign ministry of an undisclosed South American country. The attackers are using custom-built malware  FINALDRAFT Spyware designed to gain remote access to infected systems. You might be interested…


0 Comments4 Minutes

Zero spam, just good stuff

A weekly newsletter delivered straight to your inbox

Sign Up Now!

© 2024 Rhyno Cybersecurity. All rights reserved. Privacy Policy | Terms of Use

Privacy Preference Center