General Security News
-
New OilRig Downloaders Abusing Microsoft Cloud APIs for C&C Communications
Threat actors engage in cyberespionage to gain the following advantages:- Strategic Political Economic Military Hackers do...
-
HCL Investigating Ransomware Attack on Isolated Cloud Environment
In the dynamic realm of IT, HCL Technologies, the Noida-based juggernaut, recently found itself navigating choppy digital waters. The...
-
Microsoft Warns of New 'FalseFont' Backdoor Targeting the Defense Sector
Organizations in the Defense Industrial Base (DIB) sector are in the crosshairs of an Iranian threat actor as part of a campaign designed to...
-
Experts Detail Multi-Million Dollar Licensing Model of Predator Spyware
A new analysis of the sophisticated commercial spyware called Predator has revealed that its ability to persist between reboots is offered as an...
-
Chameleon Android Banking Trojan Variant Bypasses Biometric Authentication
Cybersecurity researchers have discovered an updated version of an Android banking malware called Chameleon that has expanded its targeting to...
-
Hackers Abuse Bot Protection Tool to Launch Cyber Attacks
Predator, a bot protection tool designed to fight against bots and crawlers, has now been found to be abused by threat actors for malicious...
-
Hackers Stole Banking Details From Over 50,000 Users Via Web Injections
Web injections involve injecting malicious code into websites to manipulate content or redirect users to fraudulent sites. Threat actors use...
-
Interpol Arrested 3,500 Suspects and Seized $300 Million
In a groundbreaking initiative spanning 34 countries, INTERPOL orchestrates Operation HAECHI IV, a relentless assault on online financial crime,...
-
Hackers Exploiting Old MS Excel Vulnerability to Spread Agent Tesla Malware
Attackers are weaponizing an old Microsoft Office vulnerability as part of phishing campaigns to distribute a strain of malware called Agent...
-
Urgent: New Chrome Zero-Day Vulnerability Exploited in the Wild - Update ASAP
Google has rolled out security updates for the Chrome web browser to address a high-severity zero-day flaw that it said has been exploited in the...
-
Remote Encryption Attacks Surge: How One Vulnerable Device Can Spell Disaster
Ransomware groups are increasingly switching to remote encryption in their attacks, marking a new escalation in tactics adopted by financially...
-
Sidewinder Hacker Group Using Weaponized Documents to Deliver Malware
Sidewinder APT group’s sophisticated threat landscape reveals a skilled and persistent threat targeting the Nepalese Government entities....