Hackers are employing a new method to hide malicious code in macOS extended file attributes, facilitating the delivery of a [...]
Author: Mash
China's Volt Typhoon crew has resurfaced, using compromised legacy Cisco routers to infiltrate critical infrastructure, security experts report. This resurgence [...]
A new ransomware strain called 'Ymir' has emerged, encrypting systems already compromised by the RustyStealer malware. RustyStealer, known since 2021 [...]
Microsoft has confirmed that some Windows Server 2019 and 2022 systems were unexpectedly upgraded to Windows Server 2025 due to [...]
Microsoft has acknowledged that Windows 11 updates from October have disrupted SSH connections on certain 22H2 and 23H2 systems. The [...]
Cybercriminals have devised a scheme involving a crypto-themed tank game to gain full access to players' computers. Modern tank games [...]
A new variant of SpyNote malware is mimicking Avast Mobile Security to exploit the brand's credibility, according to CYFIRMA. This [...]
A new Android banking malware named ToxicPanda has infected over 1,500 devices, enabling attackers to carry out fraudulent banking transactions [...]
The UK's National Cyber Security Centre (NCSC) released an analysis on "Pygmy Goat," a sophisticated Linux malware crafted to breach [...]
Researchers have demonstrated that OpenAI's ChatGPT-4o, with its real-time voice API, could be exploited for autonomous scams, achieving success in [...]
Microsoft has warned that Azure Virtual Desktop (AVD) users may experience up to 30 minutes of black screens when logging [...]
Hackers are exploiting two zero-day vulnerabilities, CVE-2024-8956 and CVE-2024-8957, in PTZOptics pan-tilt-zoom cameras used widely in industries like healthcare, government, [...]
North Korea's state-sponsored hacking group, Andariel, has been linked to the Play ransomware, potentially acting as an affiliate or initial [...]
A zero-day vulnerability in Windows Themes enables attackers to steal NTLM credentials, exposing users to credential theft risks. Acros Security’s [...]
A massive phishing campaign by Russia's foreign intelligence agency, SVR, is in its second week, targeting sectors like government, NGOs, [...]
A cybersecurity researcher has released a tool named "Chrome-App-Bound-Encryption-Decryption" that bypasses Google Chrome's App-Bound encryption, allowing extraction of saved credentials [...]
The Fog and Akira ransomware groups are actively exploiting a critical vulnerability (CVE-2024-40766) in SonicWall VPNs to gain entry into [...]
A newly uncovered vulnerability in Windows allows attackers to bypass Driver Signature Enforcement (DSE) by downgrading Windows kernel components, enabling [...]
Amazon has taken control of domains used by APT29, a Russian state-backed hacking group, to launch targeted phishing attacks on [...]
Apple has introduced a Virtual Research Environment (VRE) to allow public access to its Private Cloud Compute (PCC) for security [...]
The latest Qilin ransomware variant, known as Qilin.B, has emerged, utilizing Rust-based code for stronger encryption and improved evasion from [...]
Attackers are exploiting exposed Docker Remote API servers to deploy perfctl cryptomining malware, according to Trend Micro researchers. Sunil Bharti [...]
Google will soon allow organizations to create their own curated "Enterprise Web Store" for Chrome and ChromeOS extensions, focusing on [...]
The Lazarus hacking group, based in North Korea, exploited a Google Chrome zero-day vulnerability (CVE-2024-4947) using a fake decentralized finance [...]
Google's Chrome Web Store is warning users that uBlock Origin and other extensions using the Manifest V2 specification may soon [...]
Ivanti, an American IT software company, has released critical security updates addressing three new zero-day vulnerabilities in its Cloud Services [...]
Fake trading apps on Google Play and Apple's App Store have lured victims into "pig butchering" scams with global reach. [...]
Researchers found flaws in Kia's dealer portal, allowing hackers to locate and steal cars made after 2013 using only the [...]
Infostealer malware developers have updated their tools to claim they can bypass Google Chrome's App-Bound Encryption, which protects sensitive data [...]
A sprawling infostealer malware operation, led by the cybercriminal group "Marko Polo," has been uncovered. Thirty campaigns have targeted diverse [...]
Users of macOS 15 'Sequoia' are experiencing network connection problems linked to certain endpoint detection and response (EDR) and VPN [...]
The recently patched "Windows MSHTML spoofing vulnerability" (CVE-2024-43461) has been reclassified as previously exploited by the Void Banshee APT group. [...]
The RansomHub ransomware group has utilized TDSSKiller, a legitimate tool developed by Kaspersky, to deactivate endpoint detection and response (EDR) [...]
The Quad7 botnet expands its targets to include Zyxel VPN appliances, Ruckus wireless routers, and Axentra media servers, alongside previously [...]
The Docker-OSX project, an open-source initiative by Sick.Codes, enabling macOS virtualization on non-Apple hardware, was recently removed from Docker Hub [...]
The Corona Mirai-based malware botnet exploits a 5-year-old zero-day in discontinued AVTECH IP cameras (CVE-2024-7029). This high-severity issue (CVSS v4 [...]
The Chinese state-backed hacking group Volt Typhoon exploited a zero-day flaw (CVE-2024-39717) in Versa Director, a platform used by ISPs [...]
A Linux malware called 'sedexp' has remained undetected since 2022 by employing a stealthy persistence technique not currently listed in [...]
Since July 2024, a series of attacks using AppDomain Manager Injection, a less common technique, have targeted Microsoft .NET applications [...]
SolarWinds released a critical hotfix for Web Help Desk (WHD) to fix a vulnerability (CVE-2024-28987) allowing attackers to exploit hardcoded [...]