Malicious ads on CAPTCHA pages spread password stealers
Cybercriminals are using fake CAPTCHA pages to spread password-stealing malware. These fake CAPTCHAs, often appearing as pop-ups, trick users into running harmful PowerShell commands through malicious ads, mimicking legitimate verification [...]
Hackers exploit Apache Struts2 flaw to upload malware
Hackers are exploiting a new Apache Struts2 vulnerability (CVE-2024-53677) with a critical CVSS score of 9.5, posing severe risks. Apache Struts2 flaw Apache Struts2 recently announced a vulnerability with path-traversal, [...]
Hackers Exploit Microsoft Teams for Remote System Access
Hackers used Microsoft Teams to trick victims into granting remote system access, showcasing advanced social engineering tactics, according to Trend Micro. All about the attack - Microsoft Teams Exploit The [...]
Dell Security Update Patches Multiple Critical Vulnerabilities
Dell Technologies has issued a security advisory for critical vulnerabilities that could be exploited by attackers. Customers should update their systems to fix two critical CVEs affecting multiple Dell products. [...]
Stealthy Linux Malware PUMAKIT Escalates Privileges
Researchers at Elastic Security Labs discovered PUMAKIT, a Linux malware using stealth and unique privilege escalation to persist on infected systems. PUMAKIT has a multi-stage setup, including a dropper, two [...]





Get Social