deploy
- APPLICATIONS
2,500+ Truesight.sys Driver Variants Exploited to Bypass EDR and Deploy HiddenGh0st RAT
î ‚Feb 25, 2025î „Ravie LakshmananWindows Security / Vulnerability A large-scale malware campaign has been found leveraging a vulnerable Windows driver associated…
Read More » - APPLICATIONS
North Korean Hackers Target Freelance Developers in Job Scam to Deploy Malware
Freelance software developers are the target of an ongoing campaign that leverages job interview-themed lures to deliver cross-platform malware families…
Read More » - APPLICATIONS
Chinese-Linked Attackers Exploit Check Point Flaw to Deploy ShadowPad and Ransomware
î ‚Feb 20, 2025î „Ravie LakshmananRansomware / Vulnerability A previously unknown threat activity cluster targeted European organizations, particularly those in the healthcare…
Read More » - APPLICATIONS
Cybercriminals Use Eclipse Jarsigner to Deploy XLoader Malware via ZIP Archives
î ‚Feb 20, 2025î „Ravie LakshmananCybercrime / Malware A malware campaign distributing the XLoader malware has been observed using the DLL side-loading…
Read More » - APPLICATIONS
Trojanized Game Installers Deploy Cryptocurrency Miner in Large-Scale StaryDobry Attack
î ‚Feb 19, 2025î „The Hacker NewsWindows Security / Malware Users who are on the lookout for popular games were lured into…
Read More » - APPLICATIONS
Threat Actors Exploit ClickFix to Deploy NetSupport RAT in Latest Cyber Attacks
î ‚Feb 11, 2025î „Ravie LakshmananMalware / Cyber Attack Threat actors have observed the increasingly common ClickFix technique to deliver a remote…
Read More » - APPLICATIONS
Hackers Exploit Google Tag Manager to Deploy Credit Card Skimmers on Magento Stores
î ‚Feb 10, 2025î „Ravie LakshmananMalware / Payment Security Threat actors have been observed leveraging Google Tag Manager (GTM) to deliver credit…
Read More » - APPLICATIONS
XE Hacker Group Exploits VeraCore Zero-Day to Deploy Persistent Web Shells
î ‚Feb 10, 2025î „Ravie LakshmananVulnerability / Malware Threat actors have been observed exploiting multiple security flaws in various software products, including…
Read More » - APPLICATIONS
North Korean Hackers Deploy FERRET Malware via Fake Job Interviews on macOS
î ‚Feb 04, 2025î „Ravie LakshmananMalware / Cryptocurrency The North Korean threat actors behind the Contagious Interview campaign have been observed delivering…
Read More »