General Security News
-
Phishing-as-a-Service Strox Lets Hackers Phish any Brand by Submitting its Logo
The ever-evolving world of cybercrime has given birth to a disturbing phenomenon – Phishing-as-a-Service (PhaaS), and one name that sends...
-
Binance's Smart Chain Exploited in New 'EtherHiding' Malware Campaign
Threat actors have been observed serving malicious code by utilizing Binance's Smart Chain (BSC) contracts in what has been described as the "next...
-
Microsoft to Phase Out NTLM in Favor of Kerberos for Stronger Authentication
Microsoft has announced that it plans to eliminate NT LAN Manager (NTLM) in Windows 11 in the future, as it pivots to alternative methods for...
-
New PEAPOD Cyberattack Campaign Targeting Women Political Leaders
European Union military personnel and political leaders working on gender equality initiatives have emerged as the target of a new campaign that...
-
ToddyCat APT Hackers Exploiting Vulnerable Microsoft Exchange Servers
ToddyCat, a highly skilled advanced persistent threat (APT) actor notorious for launching targeted attacks in Europe and Asia, has recently...
-
Adobe, Cisco IOS, Skype, WordPad, and HTTP/2 Rapid Reset Flaws Actively Exploited
The US cybersecurity organization CISA has updated its Known Exploited Vulnerabilities catalog to include five new security flaws that are...
-
Stayin’ Alive Hacking Teleco & Government Organizations to Deploy Backdoor
Threat actors target telecoms and government ministries because they house valuable data and infrastructure. Telecoms hold sensitive...
-
Malicious NuGet Package Targeting .NET Developers with SeroXen RAT
A malicious package hosted on the NuGet package manager for the .NET Framework has been found to deliver a remote access trojan called SeroXen...
-
ShellBot Uses Hex IPs to Evade Detection in Attacks on Linux SSH Servers
The threat actors behind ShellBot are leveraging IP addresses transformed into its hexadecimal notation to infiltrate poorly managed Linux SSH...
-
How to Guard Your Data from Exposure in ChatGPT
ChatGPT has transformed the way businesses generate textual content, which can potentially result in a quantum leap in productivity. However,...
-
Multiple Citrix NetScaler Flaw Leads to DoS Attack and Data Exposure
Critical vulnerabilities in Citrix NetScaler ADC and NetScaler Gateway have exposed sensitive information and a denial of service attack. A...
-
North Korean Hackers Continue to Refine Their Arsenal of Tactics & Techniques
The Democratic People’s Republic of Korea continues to advance its offensive cyber program, showcasing its unwavering commitment to using cyber...