Evasive Azorult Campaign Delivers Malicious Payload Through Google Sites

This campaign is noteworthy as it uses an unorthodox HTML smuggling technique where the malicious payload is embedded in a separate JSON file hosted on an external website.

New Acoustic Side-Channel Attack Determines Keystrokes From Typing Patterns

Researchers have demonstrated a new acoustic side-channel attack on keyboards that can deduce user input based on their typing patterns, even in poor conditions, such as environments with noise.

'Gitgub' Malware Campaign Targets GitHub Users with RisePro Info-Stealer

Multiple GitHub repositories were hosting cracked software designed to deliver the RisePro info-stealer, indicating a widespread campaign to distribute the malware. The repositories were taken down by GitHub, and all used the same download link.

Hackers Exploit Aiohttp Bug to Find Vulnerable Networks

The ransomware actor 'ShadowSyndicate' has been scanning for servers vulnerable to CVE-2024-23334, a directory traversal flaw in the aiohttp Python library. Aiohttp is widely used by tech firms and web developers to handle concurrent HTTP requests.

Inside the Rabbit Hole: BunnyLoader 3.0 Unveiled

The new BunnyLoader variant comes with a Command and Control (C2) update, modularization of the binary, and various modules such as keylogger, stealer, clipper, and DoS functions.

Critical Vulnerability Remains Unpatched in Two Permanently Closed MiniOrange WordPress Plugins

Thousands of WordPress websites are at risk due to critical vulnerabilities in two discontinued MiniOrange plugins, allowing attackers to escalate privileges and compromise sites.

Most Widely Distributed Ransomware Now Evades Detection

StopCrypt ransomware, also known as STOP Djvu, has evolved with a new multi-stage execution process involving shellcodes to evade security tools. Unlike ransomware operations targeting businesses, StopCrypt primarily targets consumers.

PoC for Critical Arcserve UDP Vulnerabilities Published

Arcserve has addressed critical security vulnerabilities (CVE-2024-0799, CVE-2024-0800) in its Unified Data Protection (UDP) solution, which could be exploited to upload malicious files to the underlying Windows system.

Researchers Disclose Proof of Concept for New GhostRace Attack

IBM and VU Amsterdam University researchers have published a study on the new GhostRace attack, which exploits Speculative Race Conditions (SRCs) and is tracked as CVE-2024-2193.

Cisco Fixed High-Severity Elevation of Privilege and DoS Bugs

Cisco recently addressed several high-severity vulnerabilities in its IOS RX software. These vulnerabilities include three high-severity issues that can lead to privilege escalation and trigger denial-of-service (DoS) conditions.

Defend Against Threats with Cyber Fusion

Cyware is the leading provider of cyber fusion solutions that power threat intelligence sharing , end-to-end automation and 360-degree threat response.

Trending Tags