exploits
- APPLICATIONS
Russia-Linked Turla Exploits Pakistani Hackers’ Servers to Target Afghan and Indian Entities
The Russia-linked advanced persistent threat (APT) group known as Turla has been linked to a previously undocumented campaign that involved…
Read More » - APPLICATIONS
NachoVPN Tool Exploits Flaws in Popular VPN Clients for System Compromise
Dec 03, 2024Ravie LakshmananEndpoint Security / Vulnerability Cybersecurity researchers have disclosed a set of flaws impacting Palo Alto Networks and…
Read More » - GAMING
Row Over Call of Duty: Black Ops 6 Player Who Used Zombies Exploits to Become First to Hit Prestige Master Level 1,000 and Reveal Rewards
A Call of Duty: Black Ops 6 player appears to have become the first in the world to hit Prestige…
Read More » - REVIEWS
Code found online exploits LogoFAIL to install Bootkitty Linux backdoor
Normally, Secure Boot prevents the UEFI from running all subsequent files unless they bear a digital signature certifying those files…
Read More » - APPLICATIONS
APT-C-60 Exploits WPS Office Vulnerability to Deploy SpyGlace Backdoor
Nov 27, 2024Ravie LakshmananMalware / Cyber Espionage The threat actor known as APT-C-60 has been linked to a cyber attack…
Read More » - APPLICATIONS
Matrix Botnet Exploits IoT Devices in Widespread DDoS Botnet Campaign
Nov 27, 2024Ravie LakshmananIoT Security / Network Security A threat actor named Matrix has been linked to a widespread distributed…
Read More » - APPLICATIONS
RomCom Exploits Zero-Day Firefox and Windows Flaws in Sophisticated Cyberattacks
Nov 26, 2024Ravie LakshmananVulnerability / Cybercrime The Russia-aligned threat actor known as RomCom has been linked to the zero-day exploitation…
Read More » - APPLICATIONS
New Ymir Ransomware Exploits Memory for Stealthy Attacks; Targets Corporate Networks
Cybersecurity researchers have flagged a new ransomware family called Ymir that was deployed in an attack two days after systems…
Read More » - APPLICATIONS
SteelFox and Rhadamanthys Malware Use Copyright Scams, Driver Exploits to Target Victims
An ongoing phishing campaign is employing copyright infringement-related themes to trick victims into downloading a newer version of the Rhadamanthys…
Read More » - APPLICATIONS
VEILDrive Attack Exploits Microsoft Services to Evade Detection and Distribute Malware
Nov 06, 2024Ravie LakshmananSaaS Security / Threat Detection An ongoing threat campaign dubbed VEILDrive has been observed taking advantage of…
Read More »