exploits
-
CoralRaider Malware Campaign Exploits CDN Cache to Spread Info-Stealers
î ‚Apr 24, 2024î „NewsroomMalware / Data Security A new ongoing malware campaign has been observed distributing three different stealers, such as…
Read More » -
Price of zero-day exploits rises as companies harden products against hackers
Tools that allow government hackers to break into iPhones and Android phones, popular software like the Chrome and Safari browsers,…
Read More » -
Lazarus Exploits Typos to Sneak PyPI Malware into Dev Systems
î ‚Feb 29, 2024î „NewsroomMalware / Endpoint Security The notorious North Korean state-backed hacking group Lazarus uploaded four packages to the Python…
Read More » -
Raspberry Robin Malware Upgrades with Discord Spread and New Exploits
î ‚Feb 09, 2024î „NewsroomMalware / Dark Web The operators of Raspberry Robin are now using two new one-day exploits to achieve…
Read More » -
New CherryLoader Malware Mimics CherryTree to Deploy PrivEsc Exploits
î ‚Jan 25, 2024î „NewsroomThreat Intelligence / Malware Research A new Go-based malware loader called CherryLoader has been discovered by threat hunters…
Read More » -
CISA Issues Emergency Directive to Federal Agencies on Ivanti Zero-Day Exploits
î ‚Jan 20, 2024î „NewsroomNetwork Security / Threat Intelligence The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Friday issued an emergency…
Read More » -
Alert: Over 178,000 SonicWall Firewalls Potentially Vulnerable to Exploits
î ‚Jan 16, 2024î „NewsroomVulnerability / Network Security Over 178,000 SonicWall firewalls exposed over the internet are exploitable to at least one…
Read More » -
Experts Reveal New Details on Zero-Click Outlook RCE Exploits
î ‚Dec 18, 2023î „NewsroomEmail Security / Vulnerability Technical details have emerged about two now-patched security flaws in Microsoft Windows that could…
Read More » -
New NKAbuse Malware Exploits NKN Blockchain Tech for DDoS Attacks
î ‚Dec 15, 2023î „NewsroomBlockchain / Internet of Things A novel multi-platform threat called NKAbuse has been discovered using a decentralized, peer-to-peer…
Read More » -
Lazarus Group Using Log4j Exploits to Deploy Remote Access Trojans
The notorious North Korea-linked threat actor known as the Lazarus Group has been attributed to a new global campaign that…
Read More »