Hijack
-
Hijack Loader Malware Employs Process Hollowing, UAC Bypass in Latest Version
May 08, 2024NewsroomEncryption / Information Stealer A newer version of a malware loader called Hijack Loader has been observed incorporating…
Read More » -
Crooks are using Apple’s own iPhone password reset system to hijack accounts, here’s how
Your Apple ID is the key to your Apple identity, which is probably why that’s what it’s called. It’s what…
Read More » -
Hackers Hijack GitHub Accounts in Supply Chain Attack Affecting Top-gg and Others
Mar 25, 2024NewsroomSupply Chain Attack / Cryptocurrency Unidentified adversaries orchestrated a sophisticated attack campaign that has impacted several individual developers…
Read More » -
Mastodon Vulnerability Allows Hackers to Hijack Any Decentralized Account
Feb 03, 2024NewsroomVulnerability / Social Media The decentralized social network Mastodon has disclosed a critical security flaw that enables malicious…
Read More » -
Apple TV Plus renews ‘Hijack’ for second season with Idris Elba
Today, Apple TV+ announced that it was renewing its hit thriller, “Hijack,” for another season. The limited series stars SAG…
Read More » -
China-backed Hackers Hijack Software Updates to Implant “NSPX30” Spyware
A previously undocumented China-aligned threat actor has been linked to a set of adversary-in-the-middle (AitM) attacks that hijack update requests…
Read More » -
MavenGate Attack Could Let Hackers Hijack Java and Android via Abandoned Libraries
Several public and popular libraries abandoned but still used in Java and Android applications have been found susceptible to a…
Read More » -
Orange Spain Faces BGP Traffic Hijack After RIPE Account Hacked by Malware
Jan 05, 2024NewsroomNetwork Security / Malware Mobile network operator Orange Spain suffered an internet outage for several hours on January…
Read More » -
OracleIV DDoS Botnet Targets Public Docker Engine APIs to Hijack Containers
Nov 14, 2023NewsroomCloud Security / Malware Publicly-accessible Docker Engine API instances are being targeted by threat actors as part of…
Read More »