Windows malware uses PowerShell to inject malicious extension into Chrome
The malware is designed to install malicious extension(s) onto browsers. Currently, two distinct variants of ChromeLoader have been detected - one targeting Windows Operating Systems and another - Mac Operating [...]
Austria hit by BlackCat Ransomware, which demands $5 Million
The Austrian Federal State, Carinthia was attacked on Tuesday and Government services were severely disrupted as more workstations were apparently locked by the attacker. BlackCat, also called as ALPHV, a [...]
Critical Vulnerabilities Identified in OAS Platform
Open Automation Software (OAS) has been identified with vulnerabilities by researchers. These vulnerabilities are getting exploited by the threat actors. OAS is a platform that allows data connection between Industrial [...]
Automobile Manufacturer – General Motors under Credential Stuffing Attack
The General Motors had released a report last week about a data breach in the company that occurred between 11th - 29th of April month. However, the cause of this [...]
Further Analysis into BPFDoor reveals about Vulnerability Exploitation
BPFDoor is a traditional backdoor that had been exploited against the Government, telecommunication, Education and Logistics organizations for at least a several years. This was possible because it has been [...]
Get Social