security

Internet Security
Jul 8, 2023

MOVEit Releases Patches for Several High-severity Security Vulnerabilities

Last month, it was discovered that threat actors, particularly the Clop ransomware group exploited a zero-day vulnerability in the Progress MOVEit File Transfer software. The MOVEit vulnerability…
Security
Jul 4, 2023

BlackCAT Ransomware Group Pushes Malicious Installers via Malvertising

Security researchers at Trend Micro discovered that the BlackCAT, also known as ALPHV, is running malware-filled advertisement activities to entice people into fake websites that look like…
Malware
Jun 27, 2023

Threat Actors Use Trojanized Super Mario 3 Game Installer to Spread Malware

Security researchers at Cyble found that the threat actors are distributing an altered Super Mario 3: Mario Forever installer sample as a self-extracting archive executable through undisclosed…
Cybersecurity
Jul 29, 2023

What is Cyber Security? Things You Should Know?

Cybersecurity is becoming more and more crucial as technology permeates every aspect of our lives. Cybersecurity prevents unwanted access, theft, and damage to networks, electronic devices, and…
Fortinet
Mar 15, 2023

Fortinet Cyber Security Update Fails; Zero-Day Exploited by Threat Actors

A week ago, Cyber Security firm Fortinet pushed out a security update to fix a high-severity security vulnerability CVE-2022-41328, allowing threat actors to execute unauthorized commands or…
Bitwarden
Mar 10, 2023

Bitwarden Password Manager’s Autofill Feature Vulnerable to iframe-based Credential Theft

Bitwarden's Autofill Feature Poses Major Security Threat as Flaw Exposes Credentials to Malicious Iframe, Reveals Flashpoint's Analysts
Database
Mar 5, 2023

BidenCash Leak: 2M+ Credit/Debit Cards with Personal Info Exposed

Security researchers at Cyble spotted a leaked database of about 2,165,700 (Debit & credit cards) by BidenCash, celebrating its first anniversary. For those who don't know, BidenCash…
Crypto Mining
Feb 18, 2023

ProxyShellMiner Malware Exploits Vulnerabilities for Cryptocurrency Mining

In a new malware discovery named ProxyShellMiner, the malware exploits the ProxyShell vulnerabilities to install cryptocurrency miners all around the Windows domain to make a profit for…
Internet Security
Feb 14, 2023

W4SP Stealer Found on PyPi Index, Threatening Crypto Wallets & Browser Passwords

A threat actor uploaded five malicious packages containing ‘W4SP Stealer’ information-stealing malware to Python Package Index (PyPi Index) from January 27 to January 29, 2023. The security…
Cyber Hacker
Feb 11, 2023

Russian Threat Actors Target Cryptocurrency with Enigma Malware

Threat Actors from Russia are running a campaign that targets East Europeans working in the cryptocurrency industry by using fake job offers and aiming to infect the…
MacBook Air
Feb 7, 2023

New Royal Trojan Variant Discovered, Targets VMware ESXi Virtual Machines

A security researcher named Will Thomas at Equinix Threat Analysis Centre (ETAC) discovered a new variant of the Royal Trojan which is performed using a command line.…
Phishing
Jan 24, 2023

Attackers Abusing OneNote Attachments to Spread RAT Malware

Over the years, Threat actors have been deploying malware in emails via malicious Microsoft Word and Excel attachments, which then launch macros to download & install the…
Cyber Security
Jan 21, 2023

Cybercriminals Selling ‘Hook’ Android Malware for Remote Control of Smartphones

In a report by ThreatFabric, An Android Malware by the name of ‘Hook’ is being sold by cybercriminals who brag that it can remotely take control of…
CircleCi
Jan 17, 2023

Hackers Breach CircleCi’s Systems via Engineer’s Infected 2FA-Backed SSO

CircleCi, a popular CI/CD (Continuous Integration & Continuous Development) platform used for DevOps practices revealed that it suffered a security exploit. In December last year, an engineer…
Malware
Jan 9, 2023

6 Malicious PyPi Packages Installing RAT Malware via Cloudflare Tunneling

A team of researchers at Phylum security firm discovered six malicious packages on the Python Package Index, which were found installing Information stealing and Remote access trojan…
Phishing
Dec 30, 2022

Attackers Copying Legit Software Sites to Spread Malware via Google Ads Platform

There has been an increase in the number of threat actors abusing the Google Ads platform to distribute malware to unaware users who are looking to download…

End of content

No more pages to load