Home 2017-08-28T17:57:09+05:30

Malware Spreading via Binance Smart Contracts Blockchain

Cybercriminals are exploiting Binance smart contracts as intermediary C2 servers, favoring them due to their resilience against takedowns. Initially used for deploying infostealers, these smart contracts have potential applications for [...]

New GrimResource Attack Technique Exploits MMC and DLL Flaw

A new malicious code execution technique, GrimResource, targets Microsoft Management Console. Attackers exploit an old cross-site scripting vulnerability to bypass defenses and deploy malware to endpoints. GrimResource Attack Technique On [...]

Critical OpenSSH Flaw Puts Millions of Linux Servers at Risk

A critical vulnerability in OpenSSH, affecting versions 8.5p1 to 9.7p1, has been discovered, potentially exposing millions of Linux systems to arbitrary code execution attacks. This flaw in the sshd(8) component [...]

Beware of the “TRANSLATEXT” Chrome Extension from North Korean Hackers

Hackers exploit Chrome extensions to embed malware, gather personal data, display pop-ups, change URLs, and manipulate the browser. Zscaler ThreatLabz detected new activity by Kimsuky, a North Korean state-sponsored APT [...]

Xeno RAT is actively targeting users via GitHub repositories and .gg domains.

Threat actors leverage RATs for sustained access to compromised systems, facilitating prolonged espionage and exploitation. North Korean hackers and other threat actors targeting the gaming community are distributing XenoRAT via [...]

Subscribe to our newsletter to receive security tips everday!