Cyber attackers use weaponized shortcut files to distribute CHM malware
Hackers exploit weaponized shortcut files because they can execute malicious code without targeting specific users. Given their widespread usage and familiarity, shortcut files offer an effective platform for deploying malware. [...]
MorLock Ransomware Targets Organizations, Stealing Business Data
The MorLock ransomware group has escalated its assaults on Russian businesses, resulting in disruptions and financial setbacks. Identified at the start of 2024, this group has already infiltrated nine medium [...]
XSS Vulnerability in Yoast SEO Plugin Endangers Over 5 Million WordPress Websites
Security researcher Bassem Essam uncovered a critical cross-site scripting (XSS) vulnerability in the widely-used Yoast SEO WordPress plugin, potentially jeopardizing over 5 million websites. XSS Vulnerability in Yoast SEO Plugin [...]
Trend Micro Antivirus One Allowed Malicious Code Injection by Attackers
A major update for Trend Micro's Antivirus One software has been launched. This update tackles a critical vulnerability that could have allowed attackers to inject malicious code. The vulnerability, named [...]
MITRE Exposes Chinese Hackers’ Employment of ROOTROT Webshell in Network Breach
The MITRE Corporation, a non-profit organization managing research and development centers for the U.S. government, has revealed a recent infiltration by sophisticated nation-state hackers into one of its internal research [...]