General Security News
-
Beware of Fake Telegram Messenger App Hacking PCs with Purple Fox Malware
Trojanized installers of the Telegram messaging application are being used to distribute the Windows-based Purple Fox backdoor on compromised...
-
Detecting Evasive Malware on IoT Devices Using Electromagnetic Emanations
Cybersecurity researchers have proposed a novel approach that leverages electromagnetic field emanations from the Internet of Things (IoT) devices...
-
Are Medical Devices at Risk of Ransomware Attacks?
In May 2017, the first documented ransomware assault on networked medical equipment happened. The worldwide ransomware assault WannaCry compromised...
-
Wireshark 3.6.1 Released – What’s New!!
A new version of Wireshark has been released recently, Wireshark 3.6.1 with several fixes and new addons, and it’s a free open-source packet...
-
APT Groups Register Domain Used for C&C Long Before The Attack To Prevent Detection
The APT groups are massively exploiting the long before registered domains for C&C to prevent detection. Exceedingly the higher numbers of...
-
Microsoft Issues Fix for Exchange Y2K22 Bug That Crippled Email Delivery Service
Microsoft, over the weekend, rolled out a fix to address an issue that caused email messages to get stuck on its Exchange Server platforms due to...
-
New iLOBleed Rootkit Targeting HP Enterprise Servers with Data Wiping Attacks
A previously unknown rootkit has been found setting its sights on Hewlett-Packard Enterprise's Integrated Lights-Out (iLO) server management...
-
Chinese APT Hackers Used Log4Shell Exploit to Target Academic Institution
A never-before-seen China-based targeted intrusion adversary dubbed Aquatic Panda has been observed leveraging critical flaws in the Apache Log4j...
-
Mã độc Fileless mới sử dụng Windows Registry như ổ chứa nhằm tránh sự phát hiện
Một loại Trojan điều khiển từ xa dựa trên JavaScript (RAT), được phát tán thông qua một chiến dịch tấn công phi kỹ thuật đã được phát hiện lén...
-
Hacker bắt đầu khai thác lỗ hổng Log4j thứ hai khi lỗ hổng thứ ba bắt đầu xuất hiện
Công ty hạ tầng web Cloudfare thông báo vào hôm thứ tư rằng các tin tặc đang tích cực khai thác lỗ hổng thứ hai được phát hiện trong tiện...
-
BlackTech Hacker Group Uses New Flagpro Malware to Execute OS Commands
Several Japanese companies have been spotted using the Flagpro malware, and here to take the advantage of it, the BlackTech cyber-espionage APT...
-
Ongoing Autom Cryptomining Malware Attacks Using Upgraded Evasion Tactics
An ongoing crypto mining campaign has upgraded its arsenal while evolving its defense evasion tactics that enable the threat actors to conceal the...