TP-Link Router Vulnerabilities Enable Malicious SQL Execution
Cybersecurity researchers have found critical SQL injection vulnerabilities in four TP-Link router models, which could allow attackers to bypass authentication, execute malicious commands, and potentially take control of the devices. [...]
Impersonated Dev Tools on npm/PyPI Used for Credential Theft
The Socket Threat Research Team has discovered three malicious open-source packages—two on PyPI and one on npm—designed to steal sensitive cryptocurrency data like mnemonic seed phrases and private keys. These [...]
Hackers Leverage Cloudflare for RAT Deployment
Hackers have been using Cloudflare tunnels since February 2024 to host malware and spread remote access trojans like AsyncRAT, according to Sekoia TDR. Complex malware attacks are using phishing emails [...]
Infostealer Malware Surges 84% in Phishing Emails, IBM Warns
A recent report from IBM X-Force reveals that infostealer malware delivered through phishing emails has spiked by 84% week-over-week in 2024. This surge highlights a shift in cyberattack strategies, with [...]
KeyPlug Server Leak Reveals Fortinet Exploits
Cybersecurity researchers recently uncovered a server linked to the KeyPlug malware, used by the threat group RedGolf (also known as APT41). The server was accidentally exposed for less than 24 [...]
Get Social