General Security News
-
Worok Hackers Abuse Dropbox API to Exfiltrate Data via Backdoor Hidden in Images
A recently discovered cyber espionage group dubbed Worok has been found hiding malware in seemingly innocuous image files, corroborating a crucial...
-
Experts Uncover Two Long-Running Android Spyware Campaigns Targeting Uyghurs
Two long-running surveillance campaigns have been found targeting the Uyghur community in China and elsewhere with Android spyware tools designed...
-
Hackers Stealing Outlook and Thunderbird Credentials Using StrelaStealer Malware
StrelaStealer Malware The post <strong>Hackers Stealing Outlook and Thunderbird Credentials Using StrelaStealer Malware</strong>...
-
LockBit 3.0 Malware Using Weaponized Word Doc To Drop Ransomware Via Amadey Bot
The Amadey Bot has been found to be used by attackers to install LockBit 3.0 with the help of malicious MS Word document files, eventually...
-
Microsoft Blames Russian Hackers for Prestige Ransomware Attacks on Ukraine and Poland
Microsoft on Thursday attributed the recent spate of ransomware incidents targeting transportation and logistics sectors in Ukraine and Poland to a...
-
Warning: New Massive Malicious Campaigns Targeting Top Indian Banks' Customers
Cybersecurity researchers are warning of "massive phishing campaigns" that distribute five different malware targeting banking users in India. "The...
-
Hacker Rewarded $70,000 for Finding Way to Bypass Google Pixel Phones' Lock Screens
Google has resolved a high-severity security issue affecting all Pixel smartphones that could be trivially exploited to unlock the devices. The...
-
Critical Citrix ADC and Gateway Auth Bypass Flaw Let Attackers Gain Unauthorized Access
Citrix published security patches to fix a critical authentication bypass issue in Citrix ADC and Citrix Gateway. It is advised that impacted...
-
Malicious Chrome Plugin Let Remote Attacker Steal keystroke and Inject Malicious Code
Researchers at Zimperium zLabs recently identified a new Chrome browser botnet called ‘Cloud9’ that is intent on stealing the following...
-
High-Severity Flaw Reported in Critical System Used in Oil and Gas Companies
Cybersecurity researchers have disclosed details of a new vulnerability in a system used across oil and gas organizations that could be exploited...
-
New UEFI Firmware Flaws Reported in Several Lenovo Notebook Models
PC maker Lenovo has addressed yet another set of three shortcomings in the Unified Extensible Firmware Interface (UEFI) firmware affecting several...
-
APT29 Exploited a Windows Feature to Compromise European Diplomatic Entity Network
The Russia-linked APT29 nation-state actor has been found leveraging a "lesser-known" Windows feature called Credential Roaming following a...