Computer Security

CVE-2024-3400 Vulnerability Hinges on Command Injection Flaw screenshot

CVE-2024-3400 Vulnerability Hinges on Command Injection Flaw

Cyber attackers have been taking advantage of a recently revealed vulnerability in Palo Alto Networks PAN-OS software since March 26, 2024, almost three weeks before it was publicly disclosed. This activity,... Read more

April 15, 2024
Another Ransomware Threat Group Attacks Change Healthcare screenshot

Another Ransomware Threat Group Attacks Change Healthcare

Change Healthcare, a vital player in the healthcare industry, finds itself once again in the crosshairs of cybercriminals. Just a month after grappling with a ransomware attack that saw them shelling out a hefty sum... Read more

April 10, 2024
Russian-Based Hack Breaches Microsoft's Core Software Systems screenshot

Russian-Based Hack Breaches Microsoft's Core Software Systems

Amid escalating concerns over cybersecurity breaches, Microsoft disclosed ongoing efforts to expel elite Russian government hackers who infiltrated email accounts belonging to senior company executives in November.... Read more

April 8, 2024
DinodasRAT Linux Version Used in Asian Countries screenshot

DinodasRAT Linux Version Used in Asian Countries

Security researchers revealed the emergence of a Linux iteration of DinodasRAT, a versatile backdoor malware, spotted in the wild targeting regions including China, Taiwan, Turkey, and Uzbekistan. DinodasRAT, also... Read more

April 2, 2024
Darcula Phishing Kit Linked to Chinese Threat Actor screenshot

Darcula Phishing Kit Linked to Chinese Threat Actor

The Chinese-operated 'darcula' platform, specializing in Phishing-as-a-Service (PhaaS) in the Chinese language, is actively targeting organizations across more than 100 countries using sophisticated methods via a... Read more

March 28, 2024
Sign1 Malware Attacks WordPress Plugins screenshot

Sign1 Malware Attacks WordPress Plugins

A significant malware operation, identified as Sign1, has managed to infiltrate 39,000 WordPress websites within the past six months, as observed by security analysts at Sucuri. The campaign involves the implantation... Read more

March 25, 2024
RUBYCARP Botnet Attributed to Romanian Threat Actor screenshot

RUBYCARP Botnet Attributed to Romanian Threat Actor

A cyber threat group suspected to be of Romanian origin, known as RUBYCARP, has been observed operating a persistent botnet for engaging in various illicit activities including crypto mining, distributed... Read more

April 12, 2024
FlexStarling Mobile Malware Targets Specialized Victims in Africa screenshot

FlexStarling Mobile Malware Targets Specialized Victims in Africa

Human rights activists in Morocco and the Western Sahara region face a new threat from malicious actors who are using phishing tactics to deceive victims into downloading fake Android applications and accessing... Read more

April 10, 2024
Latrodectus Malware Distributed in Phishing Campaign screenshot

Latrodectus Malware Distributed in Phishing Campaign

Threat investigators have uncovered a newly identified malware named Latrodectus, which has been distributed through email phishing campaigns since at least late November 2023. Described as an emerging downloader with... Read more

April 8, 2024
CVE-2024-3094 Vulnerability (XZ Backdoor) Discovered in Linux Data Compression Library screenshot

CVE-2024-3094 Vulnerability (XZ Backdoor) Discovered in Linux Data Compression Library

Red Hat issued an urgent security advisory on Friday regarding two versions of the widely used data compression tool XZ Utils, previously known as LZMA Utils, which have been compromised with malicious code aimed at... Read more

April 1, 2024
Tycoon Phishing Kit Uses Multiple Attack Vectors screenshot

Tycoon Phishing Kit Uses Multiple Attack Vectors

The cybersecurity community has expressed significant concerns over a recently discovered phishing toolkit called Tycoon 2FA. Uncovered by the Sekoia Threat Detection & Research (TDR) team in October 2023, and... Read more

March 27, 2024
AcidPour Wiper Deployed Against Ukrainian Targets screenshot

AcidPour Wiper Deployed Against Ukrainian Targets

Researchers have discovered previously unseen wiper malware associated with Russia, which was used in an operation over two years ago targeting more than 10,000 satellite modems primarily in Ukraine just before... Read more

March 22, 2024
XploitSpy Mobile Malware Deployed Against South Asia Victims screenshot

XploitSpy Mobile Malware Deployed Against South Asia Victims

A recent Android malware campaign known as eXotic Visit has been predominantly targeting users in South Asia, particularly in India and Pakistan. The malware is being spread through dedicated websites and the Google... Read more

April 11, 2024
BatCloak Malware Attacks Use Fake Invoices screenshot

BatCloak Malware Attacks Use Fake Invoices

Security analysts have uncovered a complex series of attacks employing phishing tactics disguised as invoice-related emails to distribute various types of malware, including Venom RAT, Remcos RAT, XWorm, NanoCore RAT,... Read more

April 9, 2024
RotBot Malware Used on Asian Victims screenshot

RotBot Malware Used on Asian Victims

A suspected threat actor of Vietnamese origin has been observed targeting individuals in various Asian and Southeast Asian nations with malicious software aimed at extracting valuable data since at least May 2023.... Read more

April 5, 2024
HackBrowserData Infostealer Malware Uses in Attacks on Indian Entities screenshot

HackBrowserData Infostealer Malware Uses in Attacks on Indian Entities

Researchers have exposed a fresh espionage attempt directed at Indian governmental bodies and the nation's energy sector, employing a modified edition of an open-source data pilfering tool named HackBrowserData. This... Read more

March 29, 2024
WINELOADER Backdoor Deployed Against German Targets screenshot

WINELOADER Backdoor Deployed Against German Targets

Russian-affiliated threat actors have deployed the WINELOADER backdoor in recent cyber assaults directed at German political organizations. In late February 2024, researchers from Mandiant identified the... Read more

March 26, 2024
AceCryptor Malware Use Surges in Europe screenshot

AceCryptor Malware Use Surges in Europe

Thousands of fresh infections linked to the AceCryptor tool — which enables hackers to conceal malware and infiltrate systems undetected by antivirus software — have been uncovered in a concerted effort targeting... Read more

March 21, 2024
Loading...