Home 2017-08-28T17:57:09+05:30

New Specula Tool Turns Outlook into a C2 Server via Registry Exploit

Cybersecurity firm TrustedSec has introduced a new tool named Specula, which leverages a longstanding vulnerability in Microsoft Outlook to turn it into a Command and Control (C2) server. This discovery [...]

Microsoft 365 and Azure Outage Disrupts Multiple Services

Microsoft is investigating a global outage affecting access to some Microsoft 365 and Azure services. Microsoft 365 and Azure Outage Currently, the incident affects users worldwide and only a subset [...]

By | July 31st, 2024|Internet Security, Security Advisory, Security Update, Tips|0 Comments

Chinese Users Targeted by Gh0st RAT Malware Through Fake Chrome Page

Attackers are using Gh0stGambit to spread Gh0st RAT malware to Chinese users via a fake Google Chrome download page, mimicking the legitimate site. GH0ST RAT Trojan Targets Chinese Windows Users [...]

Progress Patches New Privilege Escalation Flaw in MOVEit File Transfer

Progress, the company behind MOVEit Transfer, has issued a critical security alert for a newly discovered vulnerability in its product. The flaw, CVE-2024-6576, is classified as high-severity with a CVSS [...]

Malicious Python Package Targets macOS Developers for Google Cloud Login Theft

Hackers exploit malicious Python packages to attack developer environments, inject harmful code, and steal sensitive information or install malware. This method leverages popular repositories for broad impact with minimal effort. [...]

Subscribe to our newsletter to receive security tips everday!