Computer Security
A Closer Look at the Turla Advanced Persistent Threat Actor
In the realm of cybersecurity, the persistent and evolving threat landscape continually challenges defenders worldwide. Among the myriad of adversaries, one group has garnered significant attention for its... Read more
NerbianRAT Linux - Novel Malware Linked to Magnet Goblin APT
Check Point reports that a threat actor driven by financial motives has been focusing on exploiting recently discovered vulnerabilities in publicly accessible services to install Linux backdoors. Identified as Magnet... Read more
WogRAT Targets Both Windows and Linux
A recently discovered malicious software, named "WogRAT," is targeting both Windows and Linux systems. It utilizes the online notepad platform called "aNotepad" as a covert channel for storing and extracting malicious... Read more
TODDLESHARK Malware Linked to Kimsuky APT
Recently, security vulnerabilities in ConnectWise ScreenConnect have been exploited by North Korean threat actors to introduce a new malware known as TODDLERSHARK. TODDLERSHARK shares similarities with known Kimsuky... Read more
CVE-2023-52160 Wi-Fi Vulnerability
Researchers in cybersecurity have detected two authentication bypass vulnerabilities in open-source Wi-Fi software used in Android, Linux, and ChromeOS devices. These flaws could deceive users into connecting to a... Read more
CVE-2024-1071 WordPress Plugin Vulnerability
A significant security vulnerability has been revealed in Ultimate Member, a widely used WordPress plugin boasting over 200,000 active installations. Identified as CVE-2024-1071, this flaw has earned a high CVSS score... Read more
PixPirate Banking Trojan Targets Android Devices
The PixPirate Android banking trojan's operators have adopted a novel tactic to elude detection on compromised devices and gather sensitive data from users in Brazil. According to IBM's recent technical report, this... Read more
CVE-2023-6000 XSS Vulnerability Used to Target Over 3,000 Sites
A recent upswing in attacks originating from a new malware campaign is exploiting a well-known vulnerability in the WordPress plugin Popup Builder, affecting more than 3,300 websites through XSS attacks. The Balada... Read more
FBI Announces Cybercrime Caused Losses of Over $12.5 Billion in 2023
The FBI's Internet Crime Complaint Center (IC3) released its annual report for 2023, disclosing that the agency observed a nearly 10% surge in cybercrime complaints compared to the previous year. In 2023, cybercrime... Read more
CHAVECLOAK Banking Trojan Targets Brazil
CHAVECLOAK banking Trojan, a new cyber threat, is spreading its infection through SMS phishing (SMishing), phishing emails, and compromised websites. FortiGuard Labs, a cybersecurity research team, has identified a... Read more
Trojan:Win32/MpTamperBulkExcl.H Detection
Trojan:Win32/MpTamperBulkExcl.H is a heuristic identification handle created to broadly identify a Trojan Horse. The usual malicious actions exhibited by Trojans such as Trojan:Win32/MpTamperBulkExcl.H include, but... Read more
TimbreStealer Malware Exploits Tax Season
A highly sophisticated cybercrime campaign utilizing the 'Timbre Stealer' malware has been identified, targeting various industries nationwide. Initially discovered by Cisco Talos in November, the malicious activity... Read more
Ande Loader Malware Spreads Using Phishing
The threat actor Blind Eagle has been observed employing a loader malware named Ande Loader to distribute remote access trojans (RATs) such as Remcos RAT and NjRAT. These attacks, initiated through phishing emails,... Read more
Fake Crypto Company Scams People Out of Thousands of Dollars
The US Better Business Bureau has issued several warnings regarding a fraudulent cryptocurrency enterprise that has deceived job seekers, causing them to lose significant sums of money. A victim named Daniel LaSane,... Read more
Snake Infostealer Abuses Facebook Messages
Threat actors are utilizing Facebook messages to disseminate a Python-based data-stealing tool named Snake, designed to capture sensitive information and credentials. According to Cybereason researcher Kotaro Ogino,... Read more
GTPDOOR Malware Targets Linux Systems
Cyber investigators have detected a newly identified Linux malware named GTPDOOR, specifically engineered for deployment in proximity to GPRS roaming exchanges (GRX) within telecom networks. Notably, this malware... Read more
CVE-2024-23204 Apple's Shortcuts Vulnerability
Information has surfaced regarding a previously patched security vulnerability of high severity in Apple's Shortcuts app, which could enable a shortcut to access sensitive device data without user consent. The... Read more
IDAT Loader Strikes Ukrainian Targets in Finland
Ukrainian entities situated in Finland have fallen victim to a malicious campaign that involves the distribution of a commercial remote access trojan known as Remcos RAT. This campaign utilizes a malware loader named... Read more