General Security News
-
Nhóm hacker FIN8 bị phát hiện sử dụng phần mềm ransomware ‘White Rabbit’ mới trong các cuộc tấn công gần đây
Nhóm hacker với mục đích tài chính FIN8 rất có thể đã tái xuất với một chủng ransomware hoàn toàn mới với tên gọi “White Rabbit”. Ransomware...
-
Emotet Uses Unconventional IP Address Formats to Spread Malware & Evade Detection
In a recent ongoing Emotet malware campaign, it has been identified that the threat actors behind this malicious campaign are using the...
-
Chinese APT Hackers Deploys MoonBounce Implant In UEFI Firmware
Kaspersky Lab experts have recently discovered a security vulnerability in UEFI firmware, and this vulnerability was detected while studying the...
-
Google Drops FLoC and Introduces Topics API to Replace Tracking Cookies for Ads
Google on Tuesday announced that it is abandoning its controversial plans for replacing third-party cookies in favor of a new Privacy Sandbox...
-
Hackers Infect macOS with New DazzleSpy Backdoor in Watering-Hole Attacks
A previously undocumented cyber-espionage malware aimed at Apple's macOS operating system leveraged a Safari web browser exploit as part of a...
-
12-Year-Old Polkit Flaw Lets Unprivileged Linux Users Gain Root Access
A 12-year-old security vulnerability has been disclosed in a system utility called Polkit that grants attackers root privileges on Linux systems,...
-
A New Spyware Campaign Attack Industrial Enterprises To Steal Corporate Credentials
Several spyware campaigns have been discovered recently by the security researchers at Kaspersky Labs in which the industrial enterprises were...
-
Google Details Two Zero-Click Bugs in Zoom Clients That Let Attackers Execute Malicious Code
Two zero-click bugs in Zoom clients have been detected recently by the security analyst Natalie Silvanovich of Google’s Project Zero that...
-
Mobile Banking Trojan BRATA Gains New, Dangerous Capabilities
The Android malware tracked as BRATA has been updated with new features that grants it the ability to track device locations and even perform a...
-
Hackers Using New Malware Packer DTPacker to Avoid Analysis, Detection
A previously undocumented malware packer named DTPacker has been observed distributing multiple remote access trojans (RATs) and information...
-
Hackers Creating Fraudulent Crypto Tokens as Part of 'Rug Pull' Scams
Misconfigurations in smart contracts are being exploited by scammers to create malicious cryptocurrency tokens with the goal of stealing funds from...
-
Microsoft Lists 25 Windows Policies That Admins Should Not Use in Windows 10 & Windows 11
Microsoft for Windows 10 and Windows 11 has recently listed 25 dead administrative templates (ADMX) policies in which Microsoft has clearly...