A massive phishing campaign by Russia's foreign intelligence agency, SVR, is in its second week, targeting sectors like government, NGOs, [...]
Category: News
A cybersecurity researcher has released a tool named "Chrome-App-Bound-Encryption-Decryption" that bypasses Google Chrome's App-Bound encryption, allowing extraction of saved credentials [...]
The Fog and Akira ransomware groups are actively exploiting a critical vulnerability (CVE-2024-40766) in SonicWall VPNs to gain entry into [...]
A newly uncovered vulnerability in Windows allows attackers to bypass Driver Signature Enforcement (DSE) by downgrading Windows kernel components, enabling [...]
Amazon has taken control of domains used by APT29, a Russian state-backed hacking group, to launch targeted phishing attacks on [...]
Apple has introduced a Virtual Research Environment (VRE) to allow public access to its Private Cloud Compute (PCC) for security [...]
The latest Qilin ransomware variant, known as Qilin.B, has emerged, utilizing Rust-based code for stronger encryption and improved evasion from [...]
Attackers are exploiting exposed Docker Remote API servers to deploy perfctl cryptomining malware, according to Trend Micro researchers. Sunil Bharti [...]
Google will soon allow organizations to create their own curated "Enterprise Web Store" for Chrome and ChromeOS extensions, focusing on [...]
The Lazarus hacking group, based in North Korea, exploited a Google Chrome zero-day vulnerability (CVE-2024-4947) using a fake decentralized finance [...]
Google's Chrome Web Store is warning users that uBlock Origin and other extensions using the Manifest V2 specification may soon [...]
Ivanti, an American IT software company, has released critical security updates addressing three new zero-day vulnerabilities in its Cloud Services [...]
Fake trading apps on Google Play and Apple's App Store have lured victims into "pig butchering" scams with global reach. [...]
Researchers found flaws in Kia's dealer portal, allowing hackers to locate and steal cars made after 2013 using only the [...]
Infostealer malware developers have updated their tools to claim they can bypass Google Chrome's App-Bound Encryption, which protects sensitive data [...]
A sprawling infostealer malware operation, led by the cybercriminal group "Marko Polo," has been uncovered. Thirty campaigns have targeted diverse [...]
Users of macOS 15 'Sequoia' are experiencing network connection problems linked to certain endpoint detection and response (EDR) and VPN [...]
The recently patched "Windows MSHTML spoofing vulnerability" (CVE-2024-43461) has been reclassified as previously exploited by the Void Banshee APT group. [...]
The RansomHub ransomware group has utilized TDSSKiller, a legitimate tool developed by Kaspersky, to deactivate endpoint detection and response (EDR) [...]
The Quad7 botnet expands its targets to include Zyxel VPN appliances, Ruckus wireless routers, and Axentra media servers, alongside previously [...]
The Docker-OSX project, an open-source initiative by Sick.Codes, enabling macOS virtualization on non-Apple hardware, was recently removed from Docker Hub [...]
The Corona Mirai-based malware botnet exploits a 5-year-old zero-day in discontinued AVTECH IP cameras (CVE-2024-7029). This high-severity issue (CVSS v4 [...]
The Chinese state-backed hacking group Volt Typhoon exploited a zero-day flaw (CVE-2024-39717) in Versa Director, a platform used by ISPs [...]
A Linux malware called 'sedexp' has remained undetected since 2022 by employing a stealthy persistence technique not currently listed in [...]
Since July 2024, a series of attacks using AppDomain Manager Injection, a less common technique, have targeted Microsoft .NET applications [...]
SolarWinds released a critical hotfix for Web Help Desk (WHD) to fix a vulnerability (CVE-2024-28987) allowing attackers to exploit hardcoded [...]
Attackers deployed the Msupedge backdoor on a university's Windows systems in Taiwan by exploiting a recently patched PHP vulnerability (CVE-2024-4577), [...]
CISA issued a warning about active exploitation of a critical vulnerability in SolarWinds' Web Help Desk (WHD) software, used by [...]
Microsoft issued a critical warning on Tuesday urging users to patch a TCP/IP vulnerability affecting all default IPv6-enabled Windows systems. [...]
Since late July 2024, a series of precise cyberattacks has targeted numerous systems within Russian government agencies and IT firms. [...]
A persistent and extensive malware operation has been forcibly installing malicious extensions for Google Chrome and Microsoft Edge browsers across [...]
Since early July 2024, a newly identified self-spreading worm named 'CMoon' has been circulating in Russia through a compromised website [...]
Samsung has introduced a new bug bounty program for its mobile devices, offering rewards up to $1,000,000 for reports demonstrating [...]
A design flaw in Windows Smart App Control and SmartScreen allows attackers to launch programs without triggering security warnings, a [...]
Hunters International, using the SharpRhino C# RAT, targets IT workers to breach corporate networks by initiating infections, elevating privileges, executing [...]
The Chinese hacking group StormBamboo has compromised an ISP to inject malware into automatic software updates. Also known as Evasive [...]
People worldwide are reporting mysterious $1 or $0 charges from Shopify-charge.com on their credit card bills, even without making any [...]
Threat actors exploit a Selenium Grid misconfiguration to deploy a modified XMRig tool for mining Monero. Selenium Grid, an open-source [...]
French police and Europol, assisted by cybersecurity firm Sekoia, are deploying a "disinfection solution" in France to remove PlugX malware [...]
The Chinese hacking group 'Evasive Panda' has been observed deploying new versions of the Macma backdoor and Nightdoor Windows malware. [...]