New Chinotto Spyware Used for Surveillance Against North Korean Defectors, Human Rights Activists

Russian cybersecurity firm Kaspersky attributed the infiltrations to a North Korean hacker group tracked as ScarCruft, also known as APT37, Reaper Group, InkySquid, and Ricochet Chollima.

Recently Patched Apache HTTP Server Vulnerability Exploited in Attacks

Organizations are being advised to ensure that their Apache HTTP servers are up to date, after it came to light that a recently patched vulnerability has been exploited in attacks.

0patch releases unofficial patches for CVE-2021-24084 Windows 10 zero-day

The vulnerability, discovered by the security researcher Abdelhamid Naceri, can be exploited to bypass a patch released by Microsoft in February to address another information disclosure flaw.

CronRAT Abuses Linux Task Scheduler to Stay Under the Radar

CronRAT Abuses Linux Task Scheduler to Stay Under the Radar - Cybersecurity news - Malware and Vulnerabilities
Security researchers have discovered a Linux-based remote access trojan (RAT) that uses an unusual stealth technique to steal data. It hides in the Linux calendar sub-system as a task that has a nonexistent date viz. February 31. Organizations are suggested to invest more in data protection solutio ... Read More

CronRAT Hides Malicious Activity on Linux Systems by Scheduling Actions on February 31st

Researchers unearthed a new Linux RAT that employs an unseen stealth technique that involves masking its actions by scheduling them for execution on February 31st, a non-existent calendar day.

Emotet's Infrastructure Witnesses Huge Growth

Emotet's Infrastructure Witnesses Huge Growth - Cybersecurity news - Malware and Vulnerabilities
Upon analyzing Emotet’s code, several researchers confirmed that the malware has been upgraded, along with expansion of its infrastructure, for an improved, secure, and robust operation.

WordPress security plugin Hide My WP addresses SQL injection, deactivation flaws

Hide My WP, a popular WordPress security plugin, contained a serious SQL injection (SQLi) vulnerability and a security flaw that enabled unauthenticated attackers to deactivate the software.

Hackers Using Microsoft MSHTML Flaw to Spy on Targeted PCs with Malware

A new Iranian threat actor has been found exploiting a patched critical flaw in the Microsoft Windows MSHTML platform to target Farsi-speaking victims with a new PowerShell-based information stealer.

Printjack Attacks Can Turn Printers Into Zombies

Printjack Attacks Can Turn Printers Into Zombies - Cybersecurity news - Malware and Vulnerabilities
According to a team of Italian researchers, a large number of printers are publicly exposed on the internet, making it easy for attackers to send malicious data remotely.

BazarLoader Adopts New Delivery Mechanisms

BazarLoader Adopts New Delivery Mechanisms - Cybersecurity news - Malware and Vulnerabilities
BazarLoader is using new delivery methods including compromised software installers and ISO files in its new version to avoid system detection. Organizations are recommended to deploy reliable anti-malware solutions to stay protected.

Defend Against Threats with Cyber Fusion

Cyware is the leading provider of cyber fusion solutions that power threat intelligence sharing , end-to-end automation and 360-degree threat response.

Trending Tags