New Rorschach Ransomware: The Fastest Encryptor
A sophisticated and fast ransomware family, dubbed Rorschach, has emerged in the threat landscape. The ransomware was spotted for the first time when deployed against a U.S.-based company. Its uniqueness [...]
Hackers Exploit WinRAR SFX Archives to Install Backdoors Undetected
Threat actors exploit WinRAR self-extracting (SFX) archives containing decoy files by adding malicious functionality to install backdoors in target systems without detection. SFX archives, which have been used for legitimate purposes, are [...]
New AlienFox toolkit steals credentials for 18 cloud services
A recently discovered comprehensive toolset dubbed AlienFox toolkit is circulating on Telegram. It’s a modular set of tools that enables malicious actors to scan for poorly configured servers, potentially leading [...]
QNAP Issues Urgent Warning to Customers Regarding Critical Linux Vulnerability
QNAP, a manufacturer of network-attached storage (NAS) systems, issued a warning to its users regarding a critical vulnerability that can be exploited through the Sudo program for Linux. CVE-2023-22809 The [...]
Microsoft Bing Search Results Altered Through AAD Misconfiguration
Recently, cybersecurity company Wiz discovered a misconfiguration issue in Azure Active Directory (AAD) that resulted in unauthorized access to several applications, which could have also led to a Bing.com takeover. What is [...]
Get Social