The AhnLab Security Intelligence Center (ASEC) disclosed a malware campaign using fake recruitment emails. The attackers impersonated developer community Dev.to and used a BitBucket link containing a legitimate-seeming project to distribute the malware. Within the project were two malware strains, BeaverTail and downloader malware “car.dll”. The BeaverTail malware steals information and downloads secondary payloads, while downloader “car.dll” enables BeaverTail’s operation. The tactics highlights the sophistication of social engineering in bypassing traditional security measures and exploiting human trust.

Singapore: Health Sciences Authority launches public consultation on the Best Practices Guide for Medical Device Cybersecurity
The Health Sciences Authority (HSA) has revealed its Best Practices Guide for Medical Device Cybersecurity. The guide provides advice for pre-market and post-market stages of