Security
Hacktivist Groups Exploit Diverse Funding Techniques for Political Operations
According to the cyberintelligence firm KELA report, hacktivist groups that work for political motives benefit from a variety of funding methods to carry out their operations. The…
MOVEit Releases Patches for Several High-severity Security Vulnerabilities
Last month, it was discovered that threat actors, particularly the Clop ransomware group exploited a zero-day vulnerability in the Progress MOVEit File Transfer software. The MOVEit vulnerability…
BlackCAT Ransomware Group Pushes Malicious Installers via Malvertising
Security researchers at Trend Micro discovered that the BlackCAT, also known as ALPHV, is running malware-filled advertisement activities to entice people into fake websites that look like…
MOVEit Releases Patches for Several High-severity Security Vulnerabilities
Last month, it was discovered that threat actors, particularly the Clop ransomware group exploited a zero-day vulnerability in the Progress MOVEit File Transfer software. The MOVEit vulnerability…
LOBSHOT Malware Spreading via Google Ads Impersonating Authentic Remote Management Software
Earlier this year, several cybersecurity researchers reported a rise in threat actors using Google Ads to spread malware in Search results. Security researchers discovered a new malware…
Evil Extractor, Data Theft Tool Causing Havoc in US & Europe
Evil Extractor: The Data Theft Tool Sold on Kodex for $59/month, Witnessing a Surge in Malicious Attacks in US & Europe as Reported by Security Firms and…
Phishing Scams Targeting US Taxpayers with Remote Access Malware
Tax Season Brings Increased Risk of Phishing Attacks as Microsoft Warns of Remote Access Malware Targeting US Taxpayers and Accountants.
Checkpoint Security Researchers Discover Fast Ransomware ‘Rorschach’ with Unique Features
Fastest Ransomware Yet? CheckPoint Discovers Rorschach with Unique Encryption, Anti-Analysis Features, and and DLL Side Loading Distribution.
Attackers Sending IRS Phishing Emails to Install Emotett Malware
Emotet Malware Targets Users with Fake Tax Forms in New Phishing Campaign Discovered by Security Researchers at Malwarebytes and Palo Alto Networks Unit 42
Common Magic & Power Magic Malware Used in Advanced Surveillance Attacks
Common Magic and Power Magic Malware Used in Targeted Surveillance Attacks on Agriculture and Transportation Sectors, Reveals Kaspersky
Fortinet Cyber Security Update Fails; Zero-Day Exploited by Threat Actors
A week ago, Cyber Security firm Fortinet pushed out a security update to fix a high-severity security vulnerability CVE-2022-41328, allowing threat actors to execute unauthorized commands or…
Bitwarden Password Manager’s Autofill Feature Vulnerable to iframe-based Credential Theft
Bitwarden's Autofill Feature Poses Major Security Threat as Flaw Exposes Credentials to Malicious Iframe, Reveals Flashpoint's Analysts
BidenCash Leak: 2M+ Credit/Debit Cards with Personal Info Exposed
Security researchers at Cyble spotted a leaked database of about 2,165,700 (Debit & credit cards) by BidenCash, celebrating its first anniversary. For those who don't know, BidenCash…
Threat Actors Exploit OpenAI’s ChatGPT Popularity to Distribute Malware
As you may have been already familiar with the Open Ai’s ChatGPT. Well, ChatGPT is a chatbox, built on GPT family 3 of the large language model.…
ProxyShellMiner Malware Exploits Vulnerabilities for Cryptocurrency Mining
In a new malware discovery named ProxyShellMiner, the malware exploits the ProxyShell vulnerabilities to install cryptocurrency miners all around the Windows domain to make a profit for…
W4SP Stealer Found on PyPi Index, Threatening Crypto Wallets & Browser Passwords
A threat actor uploaded five malicious packages containing ‘W4SP Stealer’ information-stealing malware to Python Package Index (PyPi Index) from January 27 to January 29, 2023. The security…
End of content
No more pages to load