Home 2017-08-28T17:57:09+05:30

Cerber Linux Ransomware Targets Atlassian Servers

Cybercriminals frequently deploy Linux ransomware in server environments, targeting organizations with critical data for potentially higher payouts. Cado Security Labs' cybersecurity analysts recently examined the Linux version of Cerber ransomware, [...]

Active Directory Security: 5 Critical Vulnerabilities to Monitor

Microsoft’s Active Directory (AD) acts as the backbone of your organization's network, regulating access to network and database sections to authorized users. A well-structured AD is crucial for safeguarding the [...]

Tor Browser 13.0: What’s New

Tor Browser 13.0.14 is now available, featuring crucial security enhancements for the widely-used privacy-centric web browser. Tor Browser is a web browser that focuses on privacy and anonymity by routing [...]

Surge in Zero-click Vulnerabilities: The Rise of ‘Mobile NotPetya’

The cybersecurity community warns of the rising threat of a "mobile NotPetya" event, a self-propagating mobile malware outbreak with potentially devastating consequences. This concern is fueled by the significant increase [...]

Hackers Customize LockBit 3.0 Ransomware for Global Organization Attacks

Hackers exploit LockBit 3.0 ransomware for its advanced encryption, successfully locking victims' files for ransom. Its stealthiness aids in unauthorized system access, enhancing deployment chances. Kaspersky Labs' cybersecurity researchers uncovered [...]

Recent SharePoint Method Enables Hackers to Evade Security Measures

Two recently discovered SharePoint techniques empower malicious actors to circumvent conventional security measures and extract sensitive data covertly, evading detection mechanisms. These techniques involve disguising illicit file downloads as innocuous [...]

LightSpy: Malware Threatening Android and iOS Users

A recently discovered malware dubbed LightSpy has been found to target both Android and iOS users. LightSpy, a modular malware implant, is engineered to penetrate mobile devices, posing a substantial [...]

Critical PAN-OS Command Injection Vulnerability Exploited

Palo Alto Networks alerts customers to a critical command injection vulnerability in PAN-OS GlobalProtect feature, scoring the maximum 10/10 on CVSS. Fixes are underway, the company reports. PAN-OS COMMAND INJECTION [...]

Hackers deploy malware-driven scans to uncover vulnerabilities

Hackers are employing malware-infected devices for scanning target networks rather than conducting direct scans. This strategy allows them to obscure their identity, circumvent geographical restrictions (geofencing), and expand their botnets. [...]

Critical vulnerabilities in LG TVs enable command execution

LG has addressed four critical vulnerabilities found in numerous TV models, dating back to 2023, which could grant control to malicious actors. Although attackers need to be on the same [...]

Microsoft’s latest Patch Tuesday addresses 149 security vulnerabilities

On April Patch Tuesday, Microsoft addressed 149 bugs, one of its largest security updates, spanning various products including Microsoft Office and SQL Server, with most vulnerabilities found in Windows and [...]

XZ Utils Backdoor Uncovered, Poses Threat to Linux Servers

Andres Freund discovered a backdoor in the liblzma library, part of the XZ data compression tool. The maintainer noticed a half-second delay in the updated version, leading to the flaw's [...]

Attackers Utilize Obfuscation Tools for Multi-Stage Malware Delivery via Invoice Phishing

Cybersecurity researchers uncover a complex multi-stage attack employing invoice-themed phishing decoys to distribute various malware, including Venom RAT, Remcos RAT, XWorm, NanoCore RAT, and a crypto wallet stealer. All about [...]

Two Zero-Day Android Flaws Exploited in Google Pixel

Google has revealed the detection of two Android zero-day security vulnerabilities in its Pixel smartphones, with patches already available as per the recent Pixel Update Bulletin. Even more concerning, the [...]

New E-Shopping Attack: Hijacking Users’ Banking Credentials

Since 2021, a fake e-shop scam campaign has targeted Southeast Asia, with increased activity observed by CRIL in September 2022, expanding from Malaysia to Vietnam and Myanmar. Attackers distribute a [...]

Critical OS Command Injection Vulnerability Discovered in Progress Flowmon

Progress Flowmon is a network monitoring and security solution developed by Progress, a software company. It is designed to provide visibility into network traffic, detect anomalies, and enhance network security [...]

Hackers are exploiting YouTube channels to steal your data

Cybercriminals are exploiting YouTube, a platform adored by millions, to orchestrate advanced malware attacks. These perpetrators, capitalizing on the allure of free software and video game enhancements, prey on unsuspecting [...]

StrelaStealer targets users to steal logins from Outlook and Thunderbird

A sophisticated variant of StrelaStealer malware, tailored for Spanish-speaking users, is targeting popular email clients Outlook and Thunderbird to pilfer email account credentials. StrelaStealer First detected in early November 2022, [...]

Microsoft introduces 5 new AI tools to be integrated with Azure AI.

Microsoft has rolled out new tools in Azure AI Studio to aid generative AI app developers in addressing quality and safety concerns linked with AI. These tools are either currently [...]

Patch immediately: Bitdefender Security Privilege Escalation Vulnerability

Bitdefender has patched a vulnerability across its popular products like Internet Security, Antivirus Plus, Total Security, and Antivirus Free, addressing potential privilege escalation issues. This vulnerability could grant attackers system [...]

Microsoft SharePoint vulnerability detected. Update now!

In late March 2024, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) issued an alert concerning the exploitation of a flaw in Microsoft SharePoint. Although detected in September 2023, active [...]

iPhone users, beware! Darcula phishing service targeting iMessage

Recently, cybersecurity analysts at Netcraft uncovered threat actors actively exploiting the Dracula phishing service to target USPS and global postal services via iMessage. IPhone Darcula Phishing Attack "Dracula" is an [...]

Wireshark 4.2.4 is now available: What’s New!

Wireshark continues to reign supreme, providing unmatched tools for troubleshooting, analysis, development, and education. The latest release, Wireshark 4.2.4, brings a plethora of fixes and updates, solidifying its status as [...]

Apple Silicon Unveils GoFetch Vulnerability

Researchers have revealed a vulnerability in Apple Silicon processors called GoFetch, enabling attackers to extract secret keys from Mac computers during extensive cryptographic operations. Importantly, patching the flaw is virtually [...]

Apple ID Push Bombing Attack: Targeting Apple Users to Steal Passwords

Apple users are being targeted by a sophisticated phishing campaign aimed at seizing control of their Apple IDs through a method known as "push bombing" or "MFA fatigue" attack. This [...]

Hackers deploy weaponized PDF files to distribute Mispadu banking malware

Originally focused on Latin America, the banking trojan Mispadu has broadened its scope to Europe, employing phishing emails and malicious URLs to pilfer credentials. The attackers leverage these stolen credentials [...]

Watch out for free Android VPN apps that transform your device into proxies

Security specialists have unearthed a group of Android VPN apps that surreptitiously convert user devices into proxy nodes, possibly engaging in nefarious activities unbeknownst to users. This revelation has sparked [...]

Threat actors employ Tycoon 2FA kits to pilfer your data through deceptive login pages

Cybercriminals leverage 2FA (Two-Factor Authentication) phishing kits to bypass the added security layer provided by 2FA. These kits typically replicate genuine login interfaces and prompt users to input their credentials [...]

Attention Linux admins: Fake PuTTY client installing Rhadamanthys stealer detected!

A malvertising campaign distributing a fake PuTTY client has been discovered, aiming to deploy the dangerous Rhadamanthys stealer malware. Fake PuTTY client installing Rhadamanthys stealer This campaign cleverly exploits the [...]

Patch Now: Exploits Targeting 2 Firefox Zero-Days Unveiled at Pwn2Own

Mozilla has swiftly responded to two zero-day vulnerabilities exploited during the recent Pwn2Own Vancouver 2024 hacking contest in the Firefox web browser. During this week's Pwn2Own Vancouver 2024 hacking competition, [...]

New Sysrv Botnet Abuses Google Subdomain to Spread XMRig Miner

First identified in 2020, the Sysrv botnet leverages a Golang worm to infect devices, deploying cryptominers through network vulnerability exploits. New Sysrv Botnet Abuses Google Subdomain Continuously updated by its [...]

Over 170,000 GitHub accounts of Python developers hacked in supply chain attack.

Over 170,000 users have been affected by a sophisticated attack targeting the Python software supply chain. The Checkmarx Research team has discovered a multi-layered campaign exploiting fake Python infrastructure to [...]

DHCP Exploited for Privilege Escalation in Windows Domains

Security researchers have discovered a sophisticated method, named "DHCP Coerce," that exploits the Dynamic Host Configuration Protocol (DHCP) administrators group to escalate privileges within Windows domains. The vulnerability revolves around [...]

New Acoustic Keyboard Side Channel Attack Allows Theft of Sensitive Data

With the rise in digital device usage, personal data security has become increasingly important. Side-channel attacks exploit system side effects to gather information, with electronic emissions being a known vulnerability. [...]

Microsoft announces a significant domain change for Teams

In April 2023, Microsoft announced a multi-year initiative to unify authenticated, user-facing Microsoft 365 apps and services under a single domain: cloud.microsoft. As we prepare to migrate Teams, Outlook, and [...]

Androxgh0st exploits SMTP services to steal critical data

AndroxGh0st targets Laravel applications, scanning and extracting login credentials for AWS and Twilio from .env files. AndroxGh0st, previously identified as an SMTP cracker, utilizes multiple strategies including credential exploitation, web [...]

Operation PhantomBlu: Attackers Exploit Weaponized MS Office Doc to Breach Windows

Researchers at Perception Point have discovered a new malware campaign dubbed PhantomBlu, which targets US organizations. The campaign utilizes innovative methods to deploy the NetSupport RAT (Remote Access Trojan) by [...]

Critical RCE Vulnerability in Fortra FileCatalyst

A PoC has been published for a critical RCE vulnerability found in Fortra's FileCatalyst software. RCE Vulnerability in Fortra FileCatalyst Tracked as CVE-2024-25153, this vulnerability poses a severe threat to [...]

Discontinued WordPress Plugin Vulnerability Puts Websites at Risk of Cyber Attacks

A critical vulnerability was found in miniOrange's Malware Scanner and Web Application Firewall plugins, allowing unauthenticated attackers to gain admin access to WordPress sites. This highlights ongoing challenges for website [...]

Google Chrome will soon introduce real-time phishing protection features

Google has announced an upgrade to its Safe Browsing technology, enhancing Chrome users' protection against phishing, malware, and other malicious sites in real-time. This enhancement promises to revolutionize users' web [...]

A critical flaw in Zoom Clients allows attackers to escalate privileges

A vulnerability categorized as improper input validation was discovered in Zoom Clients for Windows, Zoom VDI Client for Windows, and Zoom Meeting SDK for Windows. This flaw could potentially enable [...]

Hackers weaponize LNK files to deploy AutoIt malware

Hackers are using weaponized LNK files to deploy AutoIt malware, causing concern in the cybersecurity community. The LNK Malware Infection The infection chain starts with what appears to be a [...]

Hackers deploy TMChecker RAT to target popular VPN and mail servers

A new tool discovered on the Dark Web indicates a change in cybercriminal tactics for illicitly accessing corporate networks. TMChecker, recently uncovered by ReSecurity, is engineered to target remote-access services [...]

PixPirate, an Android banking malware

PixPirate, an Android banking malware, is pioneering stealth techniques to evade detection. IBM Trusteer researchers have unveiled its sophisticated methods, posing significant threats to financial institutions, especially in Brazil. What [...]

Adobe Reader Infostealer Spreads Through Email in Brazil

A recent email spam campaign is distributing infostealer malware disguised as an Adobe Reader Installer. The spam emails contain forged PDF documents prompting recipients to install Adobe Reader, which in [...]

The SSRF flaw in ChatGPT-Next-Web allowed attackers to gain unauthorized access.

In addition to ChatGPT and Gemini AI, two of the most popular publicly available Artificial Intelligence systems, there are numerous other standalone chatbot applications users can deploy and customize for [...]

BianLian Exploits TeamCity Vulnerability to Install Backdoors

The cybercriminal group BianLian, recognized for their ransomware assaults, has garnered attention from the information security community. Exploiting vulnerabilities within the JetBrains TeamCity platform, they executed multistage cyberattacks. Their modus [...]

Vulnerability in Over 150,000 Fortinet Devices Enables Remote Execution of Arbitrary Code by Hackers

A critical security flaw, identified as CVE-2024-21762, has been uncovered in Fortinet's FortiOS and FortiProxy secure web gateway systems, potentially affecting approximately 150,000 devices worldwide. The vulnerability permits unauthenticated remote [...]

Analysis and Description of Win32/Softcnapp Detection

PUA:Win32/Softcnapp is a generic detection name used by Microsoft Defender to identify unwanted programs. It can occasionally trigger false positive detections on legitimate applications, such as the desktop Viber client, [...]

By | March 11th, 2024|Internet Security, Microsoft, Security Advisory, Security Update, Tips|0 Comments

CHAVECLOAK Malware Exploits Windows Through Weaponized PDF File

CHAVECLOAK is a type of malware, specifically a banking trojan, known for targeting users, particularly in Brazil, with the intent of stealing sensitive financial information. CHAVECLOAK Malware Exploits Windows The [...]

Gitlab Authorization Bypass Vulnerability Enables Theft of Protected Variables

GitLab has released updated versions for its Community Edition (CE) and Enterprise Edition (EE) platforms, addressing critical vulnerabilities that enable attackers to bypass authorization mechanisms and access protected variables. Gitlab [...]

Web Server Compromised by Hackers for z0Miner Malware Deployment

The malicious actor, known as "z0miner," has been discovered targeting Korean WebLogic servers to disseminate various forms of malware, including miners, network utilities, and scripts for launching additional attacks. This [...]

Cybercriminals Exploiting iOS 0-day Vulnerability to Target iPhones – Update Immediately!

Two zero-day vulnerabilities have been uncovered in iOS and iPadOS 17.4 versions, enabling threat actors to circumvent memory protections and execute arbitrary kernel read and write operations on affected devices. [...]

WogRAT Malware Leverages Notepad Service to Target Windows & Linux Systems

Malware leverages the Notepad service to target systems like Windows and Linux, exploiting the ubiquity of Notepad across various operating systems. Malicious actors can exploit this tool via malware to [...]

TeamCity On-Premises Vulnerabilities Pose Risks to Supply Chains

Two fresh security vulnerabilities have surfaced in JetBrains TeamCity On-Premises, a prevalent CI/CD solution. Designated as CVE-2024-27198 and CVE-2024-27199, these vulnerabilities were first reported to JetBrains in February 2024 and [...]

Cybercriminals Employing Innovative DNS Hijacking Technique for Investment Scams

A recently identified DNS threat actor known as Savvy Seahorse is employing advanced tactics to lure victims into fraudulent investment platforms and pilfer their funds. According to a report released [...]

SMS Bombing: The Risks and Dangers of Text Message Attacks

In the realm of cybersecurity, SMS Bomber attacks are emerging as a modern threat with significant and concerning consequences. Many of us have experienced receiving SMS or calls from unknown [...]

Beware: Business Email Compromise (BEC) Attacks Threaten Organizations

The pandemic has spurred significant shifts in business models. With the rise of digital transformation, increased efficiency, and profitability, the threat landscape for organizations has evolved. Presently, with over 60% [...]

New Bifrost malware for Linux mimics VMware domain for evasion

A new Linux variant of Bifrost, called Bifrose, was detected employing a clever evasion tactic by utilizing a deceptive domain resembling the official VMware domain to avoid detection. What is [...]

Emerging Phishing Kit Exploits SMS and Voice Calls to Target Cryptocurrency Users

A newly discovered phishing kit has been observed impersonating the login pages of prominent cryptocurrency services as part of an attack cluster aimed primarily at mobile devices. Emerging Phishing Kit [...]

Hackers Exploit SVG Image Files for GUloader Malware Distribution

Cybercriminals are leveraging the flexibility of SVG (Scalable Vector Graphics) files for the dissemination of the GUloader malware. Hackers Exploit SVG Image Files for GUloader Malware GuLoader is notorious for [...]

Cybercriminals Exploit Weaponized ZIP Files to Acquire NTLM Hashes

Cyber adversaries utilize ZIP files as a means to weaponize them, leveraging the ease of concealing malicious payloads within compressed archives. This tactic poses a challenge for security systems, as [...]

Malicious npm Packages: North Korean Hackers Targeting Developers

Recent discoveries by Phylum indicate that a series of counterfeit npm packages identified on the Node.js repository are associated with state-sponsored actors from North Korea. Malicious npm Packages The packages [...]

SSH-Snake Malware: Stealing SSH Keys to Expand Network Spread

Threat actors exploit SSH credentials to gain unauthorized access to systems and networks, executing malicious activities by leveraging weak or compromised credentials. The misuse of SSH credentials offers a covert [...]

LiteSpeed Plugin Vulnerability Exposes 5 Million WordPress Sites to Risk

Researchers at Patchstack have issued a warning regarding an unauthenticated site-wide stored XSS vulnerability, identified as CVE-2023-40000, affecting the LiteSpeed Cache plugin for WordPress. LiteSpeed Plugin Vulnerability The LiteSpeed Cache [...]

Xeno RAT Exploits Windows DLL Search to Evade Detection

A newly identified, sophisticated malware coded in C# has emerged. Dubbed Xeno RAT, this malware boasts advanced features such as evasion tactics, payload generation, and an additional layer of threat [...]

Compromised PyPI Package Deploys NovaSentinel Stealer on Windows

Researchers uncovered an advanced cyberattack involving a dormant Python Package Index (PyPI) package called Django-log-tracker, which was unexpectedly updated to distribute the NovaSentinel stealer malware. This finding underscores a substantial [...]

LockBit Returns, Unveiling Fresh Claims and Victims

The narrative surrounding the takedown of the LockBit ransomware on February 19 is still evolving. Following nearly a week of silence and downtime, the notorious gang has resurfaced on a [...]

Microsoft Initiates Wi-Fi 7 Testing in Windows 11

Microsoft has commenced testing Wi-Fi 7 compatibility within the Windows 11 Insider Preview Build 26063. Initially available only in the Canary Channel, a potential expansion to Dev Channel users could [...]

Analysts Expose Apple’s Latest Zero-Click Shortcuts Vulnerability

Information has surfaced regarding a recently patched high-severity security vulnerability in Apple's Shortcuts app, allowing a shortcut to access sensitive device information without user consent. Apple's Latest Zero-Click Shortcuts Apple [...]

Multiple Cross-Site Scripting (XSS) Flaws in Joomla Could Result in Remote Code Execution

Five vulnerabilities have been discovered within the Joomla content management system that could be exploited to execute arbitrary code on vulnerable websites. Multiple Cross-Site Scripting (XSS) Flaws in Joomla The [...]

MrB Ransomware (.mrB Files) – Analysis & File Recovery

MrB ransomware, a variant of Dharma ransomware, was identified on February 21, 2024. It encrypts files with the extension ".mrB" and targets small businesses, demanding ransom solely for file decryption [...]

New Wi-Fi Authentication Bypass Vulnerabilities Pose Threat to Home and Enterprise Networks

Two recently discovered Wi-Fi authentication bypass vulnerabilities in open-source software could potentially expose numerous enterprise and home networks to attacks. New Wi-Fi Authentication Bypass Vulnerabilities Mathy Vanhoef, a professor at [...]

Critical Vulnerabilities in ConnectWise ScreenConnect, PostgreSQL JDBC, and VMware EAP

ConnectWise has remedied a critical vulnerability rated CVSS 10 in its ScreenConnect product, a desktop and mobile support software that offers fast and secure remote access solutions. ConnectWise has addressed [...]

Migo Malware: Targeting Redis Servers for Cryptocurrency Mining

A recent malware campaign has been detected, focusing on gaining initial access through Redis servers, aiming to mine cryptocurrency on compromised Linux hosts. What is Migo Malware? Migo Malware is [...]

Mastodon Security Flaw Enables Account Takeover

Cybersecurity experts have uncovered a critical vulnerability in the decentralized social network Mastodon, potentially enabling unauthorized access and account takeover. Fortunately, a fix is already available for this flaw. MASTODON [...]

Meta Warns of 8 Spyware Companies Targeting iOS, Android, and Windows Devices

Meta Platforms announced it has taken measures to combat malicious activities originating from eight firms in Italy, Spain, and the United Arab Emirates (UAE) engaged in the surveillance-for-hire industry. Meta [...]

SYSDF Ransomware: Analysis, .SYSDF File Recovery, and Removal Guide

SYSDF is a ransomware program belonging to the Dharma malware family. Typically targeting small businesses, it encrypts files and demands ransom payments for decryption. The ransomware was first identified by [...]

Ov3r_Stealer: Targeting Cryptocurrency and Credentials via Facebook Job Ads

"A recent report by Trustwave SpiderLabs reveals the emergence of Ov3r_Stealer, a Windows malware propagated through deceptive Facebook job advertisements. This malware is engineered to pilfer sensitive data and cryptocurrency [...]

Malicious ‘SNS Sender’ Script Exploits AWS for Mass Smishing Campaigns

A malicious Python script named SNS Sender is being promoted as a tool for threat actors to distribute bulk smishing messages by exploiting Amazon Web Services (AWS) Simple Notification Service [...]

Shim Bootloader Vulnerability Detected in Linux Systems

Security researchers have uncovered a critical vulnerability in Shim, a commonly used Linux bootloader. This flaw has the potential to enable attackers to execute malicious code and take control of [...]

Zoom patched seven vulnerabilities across Windows, iOS, and Android, including one critical flaw (CVE-2024-24691)

Zoom, the well-known video conferencing platform, recently patched 7 security vulnerabilities in a recent update. These vulnerabilities range in severity from medium to critical, and they affect a variety of [...]

Beware of Malicious Fake ChatGPT Apps

The public release of ChatGPT caused a sensation back in 2022, and it's fair to say it's been a game-changer. However, scammers often target platforms with large user bases. Fake [...]

HijackLoader Malware Introduces Fresh Evasion Techniques

The HijackLoader malware has incorporated additional defense evasion tactics. Increasingly, other threat actors are leveraging this malware for delivering payloads and tooling. The developer employed a standard process hollowing technique [...]

New Fortinet VPN RCE Vulnerability Uncovered: Apply Patch Immediately

Fortinet has issued a warning regarding a critical vulnerability found in its FortiOS SSL VPN system, which could be actively exploited by attackers. This vulnerability within Fortinet's network security solutions [...]

GitLab Security Flaw (CVE-2024-0402) Raises Concerns of File Overwrite Risk

In a recent security update, GitLab has released a patch addressing a critical vulnerability that could permit unauthorized users to overwrite files. This poses a risk of data corruption or [...]

A critical vulnerability in Apple iOS and macOS has been discovered and exploited

The Cybersecurity and Infrastructure Security Agency has identified a security flaw in Apple operating systems, specifically iOS and macOS, and has included it in the agency’s Known Exploited Vulnerabilities catalog. [...]

Kasseika Ransomware Exploits Vulnerable Antivirus Drivers

A recently discovered ransomware, named "Kasseika," employs Bring Your Own Vulnerable Driver tactics to incapacitate antivirus software prior to encrypting files. It is suspected that Kasseika may have been developed [...]

Discovery of Authentication Bypass Vulnerability in GoAnywhere MFT

Fortra has revealed a critical vulnerability in its GoAnywhere MFT (Managed File Transfer) software—an authentication bypass that poses a significant security risk. Exploiting this vulnerability successfully could enable attackers to [...]

Apple resolves the first zero-day bug exploited in attacks this year

Apple has issued security updates to tackle the first zero-day vulnerability of the year, which has been exploited in attacks and could affect iPhones, Macs, and Apple TVs. The zero-day [...]

GitHub Developer SSH Keys Targeted Through Malicious npm Packages

Security researchers recently discovered two new malicious packages on the npm open source package manager. These packages utilized GitHub to store stolen Base64-encrypted SSH keys taken from developer systems. Identified [...]

Active Exploitation of 2 Citrix Remote Code Execution (RCE) Vulnerabilities, CISA Issues Notification

CISA has set a deadline of one to three weeks for addressing three vulnerabilities associated with Citrix NetScaler and Google Chrome. These zero-day vulnerabilities have been actively exploited in cyber [...]

New Godzilla Web Shell Attacks Exploit Apache ActiveMQ Flaw

Cybersecurity researchers caution about a significant rise in threat actor activity exploiting a recently patched flaw in Apache ActiveMQ. This exploitation aims to deliver the Godzilla web shell on compromised [...]

LockBit Ransomware Uses Resume Word Files to Spread

An ASEC investigation has uncovered the latest tactics employed by the notorious LockBit ransomware. Under the guise of "post-paid pentesters," the ransomware now adopts the strategy of appearing as harmless [...]

Latest Docker Malware: CPU Theft for Crypto and Fake Website Traffic Generation

A recently launched campaign aimed at vulnerable Docker services installs both an XMRig miner and the 9hits viewer app on compromised hosts, enabling a dual monetization approach. 9hits functions as [...]

Critical Vulnerability: 178,000 SonicWall Firewalls at Risk of DoS and RCE

Recent research reveals a substantial number of vulnerable SonicWall firewall instances susceptible to remote code execution (RCE) and DoS attacks. Regrettably, no official patches are currently available, compelling clients to [...]

Atlassian’s Confluence Data Center and Server Affected by Critical RCE Vulnerability

Atlassian recommends that its customers update their Confluence Data Center and Server to safeguard against the exploitation of a critical vulnerability that has the potential to lead to Remote Code [...]

AzorUlt Stealer Resurfaces, Employing Email Phishing Tactics

Cybersecurity experts have rediscovered the eight-year-old Azorult malware, known for stealing information and harvesting sensitive data. The malware had been inactive since late 2021, prompting the question of whether this [...]

New Google Chrome 0-day Vulnerability Exploited

In the latest release notes, Google discloses a newly discovered 0-day vulnerability already being exploited in the wild. Although the update addresses the issue, the fact that it is actively [...]

Can Patches Prevent Zero-Day Attacks?

In recent years, zero-day exploits and attacks have emerged as prominent threats. Leveraging unknown vulnerabilities within software, these attacks are nearly impossible to detect and prevent. Zero-day attacks can result [...]

Windows SmartScreen Bypass Exploited by Information Stealer

The malicious campaign leverages the CVE-2023-36025 vulnerability in Microsoft Windows Defender SmartScreen to propagate Phemedrone Stealer. Employing sophisticated evasion techniques, it evades conventional security measures to target sensitive user information. [...]

Researchers identify FBot hacking tool hijacking cloud and payment services.

SentinelOne's malware hunters flagged a recently uncovered Python-based hacking tool employed by cybercriminals to hijack cloud platforms and payment services. FBot hacking tool hijacking cloud and payment services The tool, [...]

High Severity Vulnerability in Cisco Unity Connection Could Enable Root Privileges (CVE-2024-20272)

Cisco has successfully addressed a high-severity security vulnerability in Unity Connection. This flaw had the potential to allow unauthenticated attackers to upload malicious files, execute arbitrary commands, and acquire root [...]

Volexity detects Chinese hackers exploiting zero-day vulnerabilities in Ivanti VPN.

On Wednesday, cybersecurity researchers at Volexity issued a warning, revealing that suspected Chinese nation-state hackers are currently exploiting two unauthenticated remote zero-day vulnerabilities in Ivanti Connect Secure VPN devices. Zero-days [...]

Water Curupira Hackers Spreading PikaBot Loader Malware

In 2023, the threat actor known as Water Curupira has been actively disseminating the PikaBot loader malware through spam campaigns. All about PikaBot Loader Malware In a recently published report, [...]

Two Adobe ColdFusion Vulnerabilities Exploited in The Wild

Two vulnerabilities in Adobe ColdFusion have been targeted in real-world attacks, as cautioned by the Cybersecurity & Infrastructure Security Agency (CISA). These vulnerabilities stem from inadequate validation of deserialized data, [...]

SMTP Smuggling Emerges as a Fresh Email Security Concern

An innovative SMTP Smuggling technique has been reported with the capability to circumvent current security protocols. Additionally, it empowers attackers to send forged emails that appear to originate from authentic [...]

Ivanti Released a Patch in Endpoint Manager Solution (EPM) for a Critical Vulnerability

Ivanti has resolved a critical vulnerability in its Endpoint Manager (EPM) solution, designated as CVE-2023-39336, carrying a severity score of 9.6/10. This vulnerability, impacting EPM versions 2021 and 2022 before [...]

New ‘SpectralBlur’ macOS Backdoor Linked to North Korea

Security researchers have delved into the intricacies of SpectralBlur, an emerging macOS backdoor believed to be associated with the recently discovered North Korean malware family known as KandyKorn. New ‘SpectralBlur’ [...]

3 Malicious PyPI Packages Target Linux with Crypto Miners

Fortinet researchers identified three malicious packages in the PyPI repository—modularseven, driftme, and catme. These packages, attributed to the same author, "sastra," were specifically crafted to target Linux systems and install [...]

CISA Issues Alert for Juniper Secure Analytics Vulnerabilities

In a recent alert, the Cybersecurity and Infrastructure Security Agency (CISA) highlighted that Juniper has issued security updates to resolve several vulnerabilities in the Juniper Secure Analytics Virtual Appliance. This [...]

Microsoft Disables MSIX App Installer Protocol

Microsoft has disabled the MSIX installer protocol in Windows in response to its exploitation in real-world cyberattacks. Hackers discovered a method to abuse the protocol, allowing them to install malicious [...]

Misconfigurations in Google Kubernetes Engine (GKE) Lead to a Privilege Escalation Exploit Chain

A recent Unit 42 investigation uncovered a dual privilege escalation chain affecting Google Kubernetes Engine (GKE). Stemming from misconfigurations in GKE's FluentBit logging agent and Anthos Service Mesh (ASM), this [...]

Xamalicious Trojan Hits Over 327K Android Devices

Researchers uncovered a novel Android backdoor named Xamalicious at the end of 2023. This malware demonstrates significant capabilities to carry out malicious actions on compromised devices, leveraging Android's accessibility permissions [...]

Remote Encryption Attacks -Explanation & Mitigation

The digital landscape is witnessing a rise in sophisticated ransomware attacks, specifically remote encryption attacks. While the technology itself is not novel, it resembles a YouTube video uploaded a decade [...]

Microsoft Word Documents Used as Lures to Distribute Nim-Based Malware

A recently identified phishing campaign is using decoy Microsoft Word documents as a lure to deploy a backdoor written in the Nim programming language. Nim-Based Malware "Malware in uncommon programming [...]

Cryptocurrency Scams on Twitter Exploit Post Features

Scammers exploit a feature of Twitter posts, deceiving users and putting digital assets at risk. This deceptive tactic relies on Twitter's URL structure, enabling hackers to entice individuals into various [...]


Google has issued emergency updates to address yet another Chrome zero-day vulnerability that has been actively exploited in the wild. This marks the eighth zero-day vulnerability patched since the beginning [...]

Microsoft Alerts of RCE and DoS Vulnerabilities in Perforce Server

In the course of a security assessment of its game development studios, Microsoft identified four vulnerabilities in Perforce Helix Core Server. These vulnerabilities have the potential to be exploited remotely [...]

Comcast’s Xfinity Breach Exposes Data of 35.8 Million Users

Comcast has officially acknowledged a significant security breach affecting its Xfinity division, with approximately 36 million customers of the world's largest telecom provider exposed due to the CitrixBleed exploitation. Hackers [...]

Kinsta Alerts About Phishing Campaign on Google Ads

Kinsta, a leading WordPress hosting provider, has alerted its customers to a troubling cybersecurity development. Cybercriminals are exploiting Google Search Ads to promote phishing websites, with a focus on pilfering [...]

Qbot malware resurfaces in a new campaign focusing on the hospitality sector.

QakBot malware has re-emerged in phishing campaigns, following a disruption of the botnet by law enforcement during the summer. In August, a multinational law enforcement initiative named Operation Duck Hunt [...]

FortiGuard Releases Security Updates for Critical Vulnerabilities

FortiGuard unveiled security updates on December 12, 2023, to mitigate multiple critical vulnerabilities present in its FortiOS, FortiPAM, FortiMail, FortiNDR, FortiRecorder, FortiSwitch, and FortiVoice products. Exploiting these vulnerabilities could potentially [...]

Google Will Block Third-Party Cookies for All Chrome Users by the Second Half of 2024

On Thursday, Google declared its plans to initiate testing of a new feature named "Tracking Protection" from January 4, 2024. This testing phase will involve 1% of Chrome users and [...]

116 Malicious Packages Detected in PyPI Repository, Targeting Windows and Linux Operating Systems

Security experts have uncovered a collection of 116 malicious packages within the Python Package Index (PyPI) repository, specifically crafted to compromise Windows and Linux systems through a tailored backdoor. ESET [...]

Enhancing Android Security: Google Implements Clang Sanitizers to Safeguard Against Cellular Baseband Vulnerabilities

Google Emphasizes Clang Sanitizers in Strengthening Android's Cellular Baseband Security and Mitigating Vulnerabilities What are Clang sanitizers? Clang sanitizers constitute a suite of tools designed for the static analysis of [...]


iOS 17.2 and iPadOS 17.2 have been launched by the company, featuring enhancements that resolve twelve security vulnerabilities. Among these, the most critical is a memory corruption issue located within [...]

21 Security Flaws Found to Affect Over 86,000 Sierra AirLink Routers

Researchers Uncover 21 New Sierra Vulnerabilities Affecting Over 86,000 Exposed Online Devices. Sierra AirLink Routers Users of Sierra AirLink routers face potential threats, including remote code execution, unauthorized access, cross-site [...]

Microsoft Issues Warning on COLDRIVER: Ongoing Evolution in Evasion and Credential Theft Strategies

COLDRIVER, the threat actor, persists in carrying out credential theft operations targeting entities strategically significant to Russia, concurrently enhancing its capabilities to evade detection. Microsoft Issues Warning on COLDRIVER The [...]

Atlassian Deploys Crucial Software Updates to Mitigate Remote Code Execution Vulnerabilities

Atlassian has issued software patches to rectify four critical vulnerabilities in its software. Successful exploitation of these flaws could lead to remote code execution. The following is a list of [...]

Apple Addresses Exploited Zero-Day Vulnerabilities with Emergency Security Update: CVE-2023-42916, CVE-2023-42917

Apple responded to the active exploitation of two zero-day vulnerabilities in the wild by swiftly issuing emergency security updates. Identified as CVE-2023-42916 and CVE-2023-42917, these vulnerabilities specifically impact the WebKit [...]

Qlik Sense Vulnerabilities Exploited in Ransomware Attacks

There's evidence of a CACTUS ransomware campaign exploiting recently revealed security vulnerabilities in Qlik Sense, a cloud analytics and business intelligence platform. This exploitation serves as a means to gain [...]

Google Introduces RETVec: Gmail’s Latest Safeguard Against Spam and Malicious Emails

Google has unveiled RETVec (Resilient and Efficient Text Vectorizer), a new multilingual text vectorizer designed to enhance Gmail's capability in detecting potentially harmful content, including spam and malicious emails. According [...]

Exploitation Attempts Observed for Critical ownCloud Vulnerability (CVE-2023-49103)

The cybersecurity community has expressed concerns as they've detected exploitative activities focusing on ownCloud, leveraging the CVE-2023-49103 vulnerability. The spotlight is on ownCloud, a well-known open-source file server recognized for [...]

Ensuring Your Security During Black Friday and Cyber Monday 2023

Annually, the holiday season kicks off with the significant retail shopping events in the U.S., Black Friday and Cyber Monday, occurring on the Friday and Monday following Thanksgiving. Anticipated to [...]

New Rust-based SysJoker backdoor linked to Hamas hackers

SysJoker, a multi-platform malware, has been identified in a novel iteration, showcasing a comprehensive code overhaul implemented in the Rust programming language. All about SysJoker Intezer initially documented SysJoker as [...]

CISA Alert: Serious Vulnerabilities in Adobe ColdFusion (CVE-2023-44350, CVE-2023-44351, CVE-2023-44353 and More)

An alert has been released by CISA regarding several vulnerabilities affecting Adobe ColdFusion. The alert emphasizes that the vulnerabilities, if exploited, may give threat actors control over the affected systems. [...]

DarkGate and PikaBot Malware Resurrect QakBot’s Techniques in New Phishing Assaults

Phishing campaigns distributing malware families like DarkGate and PikaBot are employing tactics reminiscent of attacks associated with the now-defunct QakBot trojan. Cofense, in a report shared with The Hacker News, [...]

Six Steps to Safeguard Small Businesses Against Cyberattacks

Successful management of cyber risks in small businesses centers on adherence to workplace regulations and the attainment of robust security measures. Cyber security and data privacy protection concept with icon [...]

MySQL: Servers Targeted by DDoS-as-a-Service, Ddostf

Malicious cyber actors exploit MySQL servers through a botnet known as 'Ddostf,' utilizing it as a DDoS-as-a-Service platform available for lease by other cybercriminals. AhnLab's ASEC researchers identified the mentioned [...]

Zimbra Zero-Day Exploited to Hack Government Emails

Four distinct groups exploited a zero-day vulnerability in the Zimbra Collaboration email software in real-world attacks, aiming to illicitly acquire email data, user credentials, and authentication tokens. Zimbra Zero-Day Exploited [...]

Critical CVE-2023-34060 Vulnerability in VMware Cloud Director Appliance: CISA Advises Immediate Patching

VMware has just released an advisory (VMSA-2023-0026) addressing a critical authentication bypass vulnerability found in the VMware Cloud Director Appliance (VCD Appliance). Designated as CVE-2023-34060, this vulnerability presents a substantial [...]

Google Warns of Malicious Exploitation of Bard by Fraudster

Google Files Lawsuit Against Fraudsters Exploiting Bard's Genetics Artificial Intelligence Hype to Deceptively Distribute Malware. Today, a lawsuit was filed in California, asserting that individuals, seemingly based in Vietnam, are [...]

OracleIV DDoS Botnet Malware Targets Docker Engine API Instances

The OracleIV botnet malware employs various strategies, with a central emphasis on executing DDoS attacks through floods utilizing UDP and SSL protocols. OracleIV DDoS Botnet Malware Targets Docker Engine Cado [...]

Microsoft warns LinkedIn users of fake skills assessment portals

A sub-cluster of the notorious Lazarus Group has created deceptive infrastructure mimicking skills assessment portals for inclusion in its social engineering campaigns. Microsoft has linked the observed activity to a [...]

BiBi-Windows Wiper: Targets Windows in Pro-Hamas attacks

Cybersecurity researchers have issued a warning about a Windows variant of a malware called BiBi-Windows Wiper. This malware has been observed targeting Linux systems in cyber attacks specifically aimed at [...]

GootBot: New dangerous variant of GootLoader malware

The latest iteration of GootLoader malware, known as GootBot, enables lateral movement within compromised systems while successfully evading detection. As per IBM X-Force researchers, the inclusion of a custom bot [...]

New Variant of BlueNoroff Malware Targets Mac Users

"Researchers Discover BlueNoroff RustBucket Malware Variant Targeting MacOS" - A recent report from Jamf Threat Labs sheds light on the ongoing evolution of this attack and its potential targets. "RustBucket, [...]

SecuriDropper: New DaaS service installs malware on Android

A recently emerged business offering a "Dropper-as-a-Service" (DaaS) known as "SecuriDropper" bypasses Android's "Restricted Settings" function to install malware on devices and gain access to Accessibility Services. SecuriDropper "Restricted Settings" [...]

Mozi malware botnet: Disabled by mysterious kill-switch

The Mozi malware operation came to a sudden halt in August when an unidentified individual delivered a payload on September 27, 2023, triggering a kill-switch that effectively disabled all the [...]

Arid Viper target Android users with spyware

The hacking group known as Arid Viper (also identified as APT-C-23, Desert Falcon, or TAG-63) is purportedly responsible for a distribution campaign involving Android spyware. This spyware specifically targets Arabic-speaking [...]

Malicious NuGet Packages Caught Distributing SeroXen RAT Malware

Cybersecurity experts have discovered a fresh batch of malicious packages distributed through the NuGet package manager, employing a less conventional technique for deploying malware. The software supply chain security firm [...]

Lazarus hackers targeted a software vendor using known vulnerabilities

A recent cyber campaign attributed to the Lazarus hackers from North Korea appears to have focused on a specific vendor's software, which remains unidentified. It's reported that these hackers exploited [...]

Critical Vulnerability in F5 BIG-IP Configuration Utility Allows Request Smuggling, Leads to RCE: CVE-2023-46747

A critical vulnerability, known as CVE-2023-46747, has been uncovered in F5 BIG-IP products, allowing unauthenticated remote code execution. This vulnerability is rated at a high CVSS score of 9.8, prompting [...]

Safari Vulnerability Exposes Apple iPhones and Macs Powered by A and M-Series CPUs to Security Risks

A team of researchers has developed an innovative side-channel attack called iLeakage, which takes advantage of a vulnerability in Apple's A- and M-series CPUs found in iOS, iPadOS, and macOS [...]

Backdoor planted on hacked Cisco IOS XE devices altered to evade detection

The backdoor infiltrated Cisco devices by exploiting two zero-day flaws in IOS XE software has been altered by the threat actor to evade detection through previous fingerprinting techniques. "Examination of [...]

iOS Zero-Day Attacks: Experts Uncover Deeper Insights into Operation Triangulation

The TriangleDB implant, designed for infiltrating Apple iOS devices, incorporates four distinct modules: one for capturing audio from the device's microphone, another for extracting data from the iCloud Keychain, a [...]

SolarWinds: Serious RCE vulnerabilities discovered

Security researchers have uncovered three critical remote code execution (RCE) vulnerabilities within the SolarWinds Access Rights Manager (ARM) product. These vulnerabilities could potentially be exploited by remote attackers to run [...]

Zero-Day Vulnerabilities in Citrix NetScaler and WinRAR Are Under Active Exploitation (CVE-2023-4966, CVE-2023-38831)

Threat actors are currently exploiting critical vulnerabilities in Citrix NetScaler and WinRAR, posing a significant risk to a variety of targets, including government organizations. In a recent report, researchers exposed [...]

SpyNote: Android spyware records your calls

Security researchers conducted an analysis of the Android trojan called SpyNote, revealing numerous spyware capabilities associated with it. SpyNote: Android spyware F-Secure reports that the trojan in question is typically [...]

Fake browser updates are used to distribute malware

Cybercriminals are increasingly employing counterfeit browser updates that imitate genuine notifications from Google Chrome, Mozilla Firefox, and Microsoft Edge to distribute malware on victims' computers. Fake browser updates A recent [...]

Microsoft: New bug bounty program for AI-powered Bing

Microsoft has unveiled a fresh bug bounty program that centers around enhancing the AI-powered Bing experience, offering researchers compensation of up to $15,000. Within the framework of this novel Bing [...]

‘Rapid Reset’ DDoS Attacks Rise: October 2023 Patch Tuesday Has Arrived (CVE-2023-36563, CVE-2023-41763, CVE-2023-44487)

In October 2023, Microsoft unveiled its latest Patch Tuesday, addressing a comprehensive 103 security vulnerabilities. Within this count, 12 have received a critical rating, while three zero-day vulnerabilities are currently [...]

Google Expands Bug Bounty Program With Chrome, Cloud CTF Events

Google's research team introduced the v8CTF, a capture-the-flag (CTF) challenge centered around the V8 JavaScript engine used in the Chrome browser. This initiative can be considered an extension of the [...]

Formbook is a highly prevalent malware strain

The September 2023 Global Threat Index from Check Point cybersecurity researchers has unveiled notable shifts in the cybersecurity threat landscape. Within the report, a prominent focus is placed on a [...]

The importance of email marketing for businesses

In the contemporary era dominated by technology and social media, email marketing continues to stand out as a highly effective promotional technique for businesses. Despite the growing prominence of social [...]

Exploits released for Linux flaw giving root on major distros

Online, proof-of-concept exploits have emerged for a critical vulnerability in GNU C Library's dynamic loader, granting local attackers root privileges on prominent Linux distributions. Exploits released for Linux flaw Named [...]

Cisco Releases Urgent Patch to Fix Critical Flaw in Emergency Responder Systems

Cisco has issued updates to rectify a critical security vulnerability affecting Emergency Responder, which permits unauthorized remote attackers to access vulnerable systems through the use of hardcoded credentials. Cisco Releases [...]

Increased number of victims reported to “leak sites” of ransomware gangs

According to the "2023 State of the Threat" report by Her Secureworks, the number of victims reported on ransomware leak sites by criminal gangs reached exceptionally high levels from March [...]

EvilProxy: Phishing Microsoft 365 via indeed.com open redirect

A recent phishing campaign dubbed "EvilProxy" has come to light, with its sights set on the Microsoft 365 accounts of top-level executives within US-based organizations. This campaign takes advantage of [...]

Lazarus hackers breach aerospace company with new LightlessCan malware

The Lazarus hacking group, associated with North Korea, launched a cyberattack on a Spanish aerospace company by enticing its employees with bogus job offers, eventually infiltrating the corporate network through [...]

Cisco: Prompts administrators to patch an IOS zero-day

On Wednesday, Cisco issued a warning to its customers, urging them to address a zero-day vulnerability in IOS and IOS XE systems, which can be exploited by malicious users. Cisco: [...]

Zanubis: The Android banking trojan gets even more dangerous

The Android banking Trojan Zanubis has adopted a new disguise, posing as the official application of the Peruvian government organization SUNAT (Superintendencia Nacional de Aduanas y de Administración Tributaria), thereby [...]

Hackers are actively exploiting an Openfire flaw

Malicious actors are actively taking advantage of a critical vulnerability in Openfire messaging servers, using it to encrypt server data with ransomware and deploy cryptocurrency miners. Cybercriminals are currently exploiting [...]

Researchers uncover a thriving underground economy for malware targeting IoT devices

Researchers have exposed a robust clandestine ecosystem focused on crafting malware for IoT device exploitation. Researchers at Kaspersky have detected a flourishing underground marketplace on the dark web, featuring zero-day [...]

ZenRAT Malware Uncovered in Bitwarden Impersonation

A recently discovered malware variant named ZenRAT has surfaced, camouflaged within fraudulent Bitwarden installation bundles. ZenRAT Malware Proofpoint has uncovered ZenRAT, a modular remote access trojan (RAT) that specifically targets [...]

Xenomorph Android malware: Targets users of banks and crypto wallets in the US

Researchers have uncovered a new distribution campaign for the Xenomorph malware, focusing on Android users in the United States, Canada, Spain, Italy, Portugal, and Belgium. The cybersecurity firm's analysts at [...]

Stealth Falcon hackers are using the new Deadglyph malware

A recently discovered backdoor malware, known as "Deadglyph," has been detected in a cyberattack targeting a government agency in the Middle East. This malicious software has been linked to the [...]

The Rise of Mobile Malware

Mobile malware, as its name implies, is specialized malicious software crafted specifically to infiltrate mobile devices such as smartphones and tablets, with the intent of compromising sensitive user data. The [...]

Fake WinRAR proof-of-concept exploit drops VenomRAT malware

An imitation proof-of-concept (PoC) exploit targeting a WinRAR RCE vulnerability that was recently patched has been discovered on GitHub, with the intention of spreading the VenomRAT malware to unsuspecting users. [...]

Mastodon Vulnerabilities and Critical Zero-Day in TrendMicro’s Apex One Addressed: CVE-2023-41179, CVE-2023-42451, CVE-2023-42452

Mastodon has taken action to resolve two vulnerabilities, specifically CVE-2023-42451 and CVE-2023-42452. Additionally, a zero-day vulnerability, denoted as CVE-2023-41179, has been swiftly addressed in TrendMicro’s Endpoint Security product, Apex One. [...]

Nest devices can now only join one speaker group at a time

Google has confirmed that due to a recent court ruling, it is currently not possible to simultaneously use your Nest devices in multiple rooms. In a forum post, a Nest [...]

Within the Code of a Fresh XWorm Variant

XWorm is a recent addition to the remote access trojan family, quickly establishing itself as one of the most enduring global threats. Since its initial detection by researchers in 2022, [...]

The new Android banking trojan is based on ERMAC

A recent analysis of the Android banking trojan Hook has uncovered its foundation in its predecessor, ERMAC. Hook : New Android banking trojan In January 2023, ThreatFabric initially identified Hook, [...]

Uncommon AWS Services Targeted by New AMBERSQUID Cryptojacking Operation

An innovative cloud-native cryptojacking campaign has targeted lesser-known Amazon Web Services (AWS) offerings like AWS Amplify, AWS Fargate, and Amazon SageMaker, with the intent of clandestinely mining cryptocurrency. New AMBERSQUID [...]

LockBit Attack Fails, 3AM Ransomware Steps In as Plan B

Researchers have recently uncovered a novel ransomware variant known as 3AM. Their inquiry unveiled that the initial documented instance of this ransomware emerged when malicious actors replaced it with LockBit [...]

By | September 18th, 2023|BOTNET, Compromised, Exploitation, malicious cyber actors, Ransomware|0 Comments

Free Download Manager site has been redirecting Linux users to malware for years ChatGPT

The Free Download Manager website has been consistently redirecting Linux users to malware-infected destinations over an extended period! An incident report highlights an attack on the Free Download Manager supply [...]

Notepad++ 8.5.7 addresses critical security vulnerabilities

"The latest release, Notepad++ version 8.5.7, includes security updates to address several buffer overflow vulnerabilities identified in the previous version." Notepad++ Notepad++ is a widely-used, free source code editor with [...]

A Modular Malware Loader, HijackLoader, Gaining Prominence in the World of Cybercrime

"HijackLoader, a recently emerged malware loader, is rapidly gaining popularity within the cybercriminal community for distributing a range of payloads, which include DanaBot, SystemBC, and RedLine Stealer." More about HijackLoader [...]

How to make sure you don’t lose important emails in Gmail

Secure Entry in Gmail is a crucial mode that enables users to safeguard against missing essential emails. This feature empowers users to designate specific email addresses and domains within Gmail, [...]

Akira Ransomware Attacks Exploit Zero-Day Cisco ASA Vulnerability

In recent updates, there have been emerging reports about threat actors associated with the Akira ransomware focusing their attention on Cisco VPNs that do not employ multi-factor authentication (MFA). This [...]

Alert for Mac Users: A Malvertising Campaign spreads Atomic Stealer macOS Malware

A fresh malvertising campaign has come to light, disseminating an updated variant of macOS stealer malware known as Atomic Stealer (AMOS). This discovery suggests active maintenance by its author. Atomic [...]

By | September 8th, 2023|BOTNET, Evilproxy, Exploitation,