The GootLoader malware has evolved with a new variant called GootBot, designed to enable lateral movement on compromised systems and [...]
Category: News
The North Korean-backed group BlueNorOff, known for targeting cryptocurrency exchanges and financial institutions, is using new macOS malware called ObjCShellz [...]
Apple's "Find My" network, initially designed to help users locate lost Apple devices, can be exploited by malicious actors to [...]
Four zero-day vulnerabilities in Microsoft Exchange have been revealed, allowing remote attackers to execute arbitrary code and access sensitive data. [...]
A recently identified malware called 'KandyKorn' for macOS has emerged in a cyber campaign associated with the North Korean hacking [...]
Mozi, a prominent DDoS malware botnet that surfaced in 2019, predominantly attacking IoT devices, lost activity in August. Then, on [...]
Czech cybersecurity company, Avast, confirmed its antivirus SDK wrongly flagged a Google Android app as malware on Huawei, Vivo, and [...]
On October 25th, hackers stole $4.4 million in cryptocurrency using compromised LastPass databases to obtain private keys and passphrases. This [...]
Microsoft provided a fix for a known Microsoft 365 issue causing 'Something Went Wrong [1001]' sign-in errors and rendering desktop [...]
Pwn2Own Toronto 2023 ended with researchers earning $1,038,500 for 58 zero-day exploits targeting various consumer products from October 24 to [...]
StripedFly, a highly sophisticated cross-platform malware, went unnoticed by cybersecurity experts for five years, infecting over a million Windows and [...]
The Matrix open standard and real-time communication protocol team has launched version 2 with group VoIP encryption, faster loading times, [...]
1Password, a widely-used password manager for over 100,000 businesses, faced a security incident when hackers infiltrated its Okta ID management [...]
Google is preparing to test a "IP Protection" feature in Chrome, which hides users' IP addresses with proxy servers to [...]
A cyber threat actor is using fake LinkedIn posts and direct messages to trick people into downloading info-stealing malware, such [...]
The BlackCat/ALPHV ransomware operation recently incorporated a novel tool called 'Munchkin.' This tool harnesses virtual machines for surreptitious deployment of [...]
Amazon now offers passkey support for passwordless login, enhancing security by using biometrics or PINs linked to devices like phones [...]
Discord remains a hotspot for hackers, including APT groups, who use it to distribute malware, steal data, and target critical [...]
Between July and September, DarkGate malware attacks leveraged compromised Skype accounts to infect targets via messages with VBA loader script [...]
Hackers are exploiting LinkedIn Smart Links for phishing attacks to steal Microsoft account credentials. Smart Links are part of LinkedIn's [...]
A zero-day DDoS technique called 'HTTP/2 Rapid Reset' broke records in magnitude since August. Amazon, Cloudflare, and Google jointly reported [...]
Multiple Balada Injector campaigns have infected over 17,000 WordPress sites using known premium theme plugin vulnerabilities. Discovered in December 2022 [...]
The Chrome team is enhancing user experience with a new "Organize Tabs" feature, located at the top left corner, near [...]
Over the past six months, a complex malicious campaign has emerged, planting info-stealing packages on open-source platforms with 75,000 downloads. [...]
A recent Linux vulnerability, dubbed 'Looney Tunables' (CVE-2023-4911), allows local attackers to obtain root privileges by exploiting a buffer overflow [...]
'BunnyLoader' is a newly discovered fileless loader malware. It can steal clipboard contents, execute payloads, record keystrokes, steal data and [...]
The LostTrust ransomware operation is suspected to have rebranded from MetaEncryptor, employing nearly identical data leak sites and encryption methods. [...]
Hackers can exploit logic flaws in Cloudflare's Firewall and DDoS prevention, potentially undermining its protection. This poses a significant threat [...]
The North Korean 'Lazarus' hacking group used a fake job opportunity to target a Spanish aerospace company's employees. This was [...]
Malicious ads promoting malware-infested download sites are infiltrating Microsoft's Bing Chat, powered by OpenAI's GPT-4. Introduced to rival Google's search [...]
Researchers from four US universities created 'GPU.zip,' a new GPU side-channel attack exploiting data compression for leaking sensitive visuals. They [...]
Google plans to retire Gmail's Basic HTML view in January 2024, requiring users to switch to modern browsers for continued [...]
The advanced 'Deadglyph' backdoor malware was recently detected in a cyberespionage attack on a Middle Eastern government agency. It's linked [...]
In August 2023, a new threat actor called 'Sandman' was uncovered by SentinelLabs and QGroup GmbH. Sandman targets telecom service [...]
The malware loader 'Bumblebee' is back from a two-month break with a new campaign that exploits 4shared WebDAV services. This [...]
A Proof-of-Concept (PoC) exploit for a Windows Themes vulnerability, known as CVE-2023-38146 or ThemeBleed, has been made public. This vulnerability, [...]
Microsoft is making significant changes to its printer driver strategy over the next four years, which includes blocking third-party printer [...]
Google's Privacy Sandbox is replacing third-party cookies for tracking user interests in Chrome. Upon launching Chrome, users now see an [...]
Apple issued urgent security updates to address two newly discovered zero-day vulnerabilities. These vulnerabilities were exploited in attacks aimed at [...]
An unidentified threat actor is exploiting serious security flaws (CVE-2023-28432 and CVE-2023-28434) in MinIO storage systems, leading to unauthorized code [...]