Microsoft Word Documents Used as Lures to Distribute Nim-Based Malware
A recently identified phishing campaign is using decoy Microsoft Word documents as a lure to deploy a backdoor written in the Nim programming language. Nim-Based Malware "Malware in uncommon programming [...]
Cryptocurrency Scams on Twitter Exploit Post Features
Scammers exploit a feature of Twitter posts, deceiving users and putting digital assets at risk. This deceptive tactic relies on Twitter's URL structure, enabling hackers to entice individuals into various [...]
GOOGLE ADDRESSED A NEW ACTIVELY EXPLOITED CHROME ZERO-DAY
Google has issued emergency updates to address yet another Chrome zero-day vulnerability that has been actively exploited in the wild. This marks the eighth zero-day vulnerability patched since the beginning [...]
Microsoft Alerts of RCE and DoS Vulnerabilities in Perforce Server
In the course of a security assessment of its game development studios, Microsoft identified four vulnerabilities in Perforce Helix Core Server. These vulnerabilities have the potential to be exploited remotely [...]
Comcast’s Xfinity Breach Exposes Data of 35.8 Million Users
Comcast has officially acknowledged a significant security breach affecting its Xfinity division, with approximately 36 million customers of the world's largest telecom provider exposed due to the CitrixBleed exploitation. Hackers [...]