Hackers Use Google Ads to Distribute Fakebat Malware
Researchers have found that Fakebat malware is again being spread through malicious Google Ads, targeting users searching for popular productivity software. Malwarebytes flagged an ad impersonating the app Notion. The [...]
Roblox Devs Targeted with Malicious npm Packages
Researchers found five malicious npm packages targeting Roblox developers, stealing credentials and personal data. These packages, including autoadv, ro.dll, node-dlls, and two rolimons-api versions, mimic legitimate modules commonly used by [...]
Hackers Use Malicious Excel Files to Deliver Remcos RAT to Windows Users
Hackers exploit Excel documents due to their popularity and built-in vulnerabilities. With VBA macros now blocked by default, they have turned to using “.XLL” files to deliver malware. Hackers Use [...]
Watch Out for Fake Copyright Claims Spreading Rhadamanthys Stealer
CheckPoint security experts recently warned about fake copyright claims spreading Rhadamanthys stealer malware. Stealer malware is designed to infiltrate computers and steal sensitive data. Once installed, it connects to a [...]
Cisco Vulnerability Allowed Attackers to Execute Commands as Root
A critical vulnerability in Cisco Unified Industrial Wireless Software, affecting Cisco Ultra-Reliable Wireless Backhaul (URWB) Access Points, has been discovered. CVE-2024-20418 Tracked as CVE-2024-20418, this flaw allows unauthenticated remote attackers [...]