New Ballista IoT Botnet Linked to Italian Threat Actor
Cato Networks has analyzed a new IoT botnet named Ballista, which targets TP-Link Archer routers. The post New Ballista IoT Botnet Linked to Italian Threat Actor appeared first on SecurityWeek.
Cato Networks has analyzed a new IoT botnet named Ballista, which targets TP-Link Archer routers. The post New Ballista IoT Botnet Linked to Italian Threat Actor appeared first on SecurityWeek.
Authorities in India today arrested the alleged co-founder of Garantex, a cryptocurrency exchange sanctioned by the U.S. government in 2022 for facilitating tens of billions of dollars in money laundering by transnational criminal and cybercriminal organizations. Sources close to the investigation told KrebsOnSecurity the Lithuanian national Aleksej Besciokov, 46, wasRead More »Alleged Co-Founder of Garantex Arrested in India
Cybersecurity leaders discuss the Federal Contractor Cybersecurity Vulnerability Reduction Act of 2025.
In this blog entry, we uncovered a campaign that uses fake GitHub repositories to distribute SmartLoader, which is then used to deliver Lumma Stealer and other malicious payloads. The campaign leverages GitHub’s trusted reputation to evade detection, using AI-generated content to make fake repositories appear legitimate.
Elon Musk claimed that the social media platform X was being targeted in a “massive cyberattack” that impacted availability. The post Elon Musk Claims X Being Targeted in ‘Massive Cyberattack’ as Service Goes Down appeared first on SecurityWeek.
Binance is being spoofed in an email campaign using free TRUMP Coins as a lure leading to the installation of the ConnectWise RAT. The post Trump Coins Used as Lure in Malware Campaign appeared first on SecurityWeek.
Palo Alto Networks has shared details on several high-severity Mitsubishi Electric and Iconics SCADA vulnerabilities. The post Details Disclosed for SCADA Flaws That Could Facilitate Industrial Attacks appeared first on SecurityWeek.
With the increasing cyber threats targeting operational technology (OT) environments, it’s more important than ever to proactively assess and strengthen the security of your Industrial Control Systems (ICS). One of the most effective ways to do this is through an OT penetration test.
However, challenges can arise when pursuing IT careers, including the need for more technical knowledge (35%), tools and best practices (31%).
A new report focuses on the risks of personal app use, generative AI and social engineering in the financial sector.