Gigabyte firmware component can be abused as a backdoor
Attackers can abuse the UEFI firmware to inject executable malware code into the Windows kernel, compromising systems.
View ArticleAttackers use Python compiled bytecode to evade detection
Newly discovered campaign takes advantage of the fact that most vulnerability scanning tools don't read compiled open-source software.
View ArticleRussia points finger at US for iPhone exploit campaign that also hit...
The Russian federal security agency, the FSB, has put out a security alert claiming that US intelligence services are behind an attack campaign that exploits vulnerabilities in iOS and compromised...
View ArticleClop ransomware gang exploits the MOVEit Transfer vulnerability to steal data
At least one organization, UK payroll provider Zellis, has confirmed a breach via the MOVEit utility.
View ArticleClop extortion gang gives MOVEit exploit victims one week to reach out
At least 20 organisations have been compromised by Clop's MOVEit exploit, according to new research.
View ArticleNorth Korean APT group targets email credentials in social engineering campaign
The Kimsuky group is adept at building relationships at target organisations to more easily deliver malware and steal credentials.
View ArticleBusiness email compromise scams take new dimension with multi-stage attacks
A new attack group leverages trusted relationships between partner organisations to bypass multifactor authentication.
View ArticleMOVEit Transfer developer patches more critical flaws after security audit
A third-party audit reveals new MOVEit vulnerabilities, for which Progress Software has issued patches.
View ArticleAttackers set up rogue GitHub repos with malware posing as zero-day exploits
The threat actor created fake personas on Twitter for researchers at a non-existent security firm.
View ArticleMicrosoft Office 365 AitM phishing reveals signs of much larger BEC campaign
This newly discovered, global campaign indicates growing popularity for multi-stage adversary-in-the-middle tactics among threat actors.
View ArticleRomanian cybercrime gang Diicot builds DDoS botnet with Mirai variant
The main focus of Diicot’s attacks appears to support cryptojacking efforts but the group is also employing botnets and brute-force tactics for other purposes.
View ArticlePublic exploit is now available for Cisco AnyConnect VPN client
Attackers could elevate privileges on systems with the vulnerable, unpatched Cisco clients, possibly taking full control.
View ArticleCritical flaw in VMware Aria Operations for Networks sees mass exploitation
Akamai reports nearly 700,000 attacks with 27,000 of its customers being scanned for the vulnerability.
View ArticleWhy you should review the security of your MSSQL servers
MS SQL Server is by far the most common DBMS that attackers target, probably due to its tight integration with Windows.
View ArticleMalicious campaign uses npm packages to support phishing attacks
Researchers have identified yet another malicious use for JavaScript packages hosted on the npm registry: hosting files required by automated phishing kits or slipping phishing pages into applications...
View Article
More Pages to Explore .....