Attackers Utilize Obfuscation Tools for Multi-Stage Malware Delivery via Invoice Phishing
Cybersecurity researchers uncover a complex multi-stage attack employing invoice-themed phishing decoys to distribute various malware, including Venom RAT, Remcos RAT, XWorm, NanoCore RAT, and a crypto wallet stealer. All about [...]
Two Zero-Day Android Flaws Exploited in Google Pixel
Google has revealed the detection of two Android zero-day security vulnerabilities in its Pixel smartphones, with patches already available as per the recent Pixel Update Bulletin. Even more concerning, the [...]
New E-Shopping Attack: Hijacking Users’ Banking Credentials
Since 2021, a fake e-shop scam campaign has targeted Southeast Asia, with increased activity observed by CRIL in September 2022, expanding from Malaysia to Vietnam and Myanmar. Attackers distribute a [...]
Critical OS Command Injection Vulnerability Discovered in Progress Flowmon
Progress Flowmon is a network monitoring and security solution developed by Progress, a software company. It is designed to provide visibility into network traffic, detect anomalies, and enhance network security [...]
Hackers are exploiting YouTube channels to steal your data
Cybercriminals are exploiting YouTube, a platform adored by millions, to orchestrate advanced malware attacks. These perpetrators, capitalizing on the allure of free software and video game enhancements, prey on unsuspecting [...]