Home 2017-08-28T17:57:09+05:30

Watch Out for Fake Copyright Claims Spreading Rhadamanthys Stealer

CheckPoint security experts recently warned about fake copyright claims spreading Rhadamanthys stealer malware. Stealer malware is designed to infiltrate computers and steal sensitive data. Once installed, it connects to a [...]

By | November 9th, 2024|malicious cyber actors, Malware, Security Advisory, Security Update|0 Comments

Cisco Vulnerability Allowed Attackers to Execute Commands as Root

A critical vulnerability in Cisco Unified Industrial Wireless Software, affecting Cisco Ultra-Reliable Wireless Backhaul (URWB) Access Points, has been discovered. CVE-2024-20418 Tracked as CVE-2024-20418, this flaw allows unauthenticated remote attackers [...]

ToxicPanda Malware Targets Bank Users

Recent research has identified a new Android malware strain, initially mistaken for TgToxic, now called ToxicPanda. Although it shares some bot command similarities, ToxicPanda’s code diverges significantly, lacking key TgToxic [...]

Threat Actor Leaks Alleged Nokia Source Code

The threat actor known as IntelBroker, along with EnergyWeaponUser, has claimed responsibility for a major data breach involving Nokia’s proprietary source code. This news has shaken the tech industry and [...]

ClickFix Malware Targets GMeet, Zoom Pages

The “ClickFix” tactic exploits fake Google Meet and Zoom pages to deliver advanced malware, mimicking legitimate video conferencing platforms used for business and personal communication. The Sekoia TDR team monitors [...]

Subscribe to our newsletter to receive security tips everday!