Researchers Detail Multistage Attack Hijacking Systems with SSLoad, Cobalt Strike
Apr 24, 2024NewsroomMalware / Endpoint Security
Cybersecurity researchers have discovered an ongoing attack campaign that's leveraging phishing emails to deliver malware called SSLoad.
The campaign,...
U.S. Treasury Sanctions Iranian Firms and Individuals Tied to Cyber Attacks
Apr 24, 2024NewsroomCyber Attack / Cyber Espionage
The U.S. Treasury Department's Office of Foreign Assets Control (OFAC) on Monday sanctioned two firms and four...
Major Security Flaws Expose Keystrokes of Over 1 Billion Chinese Keyboard App Users
Apr 24, 2024NewsroomEncryption / Mobile Security
Security vulnerabilities uncovered in cloud-based pinyin keyboard apps could be exploited to reveal users' keystrokes to nefarious actors.
The...
eScan Antivirus Update Mechanism Exploited to Spread Backdoors and Miners
A new malware campaign has been exploiting the updating mechanism of the eScan antivirus software to distribute backdoors and cryptocurrency miners like XMRig...
CoralRaider Malware Campaign Exploits CDN Cache to Spread Info-Stealers
Apr 24, 2024NewsroomMalware / Data Security
A new ongoing malware campaign has been observed distributing three different stealers, such as CryptBot, LummaC2, and Rhadamanthys...
German Authorities Issue Arrest Warrants for Three Suspected Chinese Spies
Apr 23, 2024NewsroomCounterintelligence / National Security
German authorities said they have issued arrest warrants against three citizens on suspicion of spying for China.
The full...
Apache Cordova App Harness Targeted in Dependency Confusion Attack
Apr 23, 2024NewsroomSupply Chain Attack / Application Security
Researchers have identified a dependency confusion vulnerability impacting an archived Apache project called Cordova App Harness.
Dependency...
Police Chiefs Call for Solutions to Access Encrypted Data in Serious Crime Cases
Apr 23, 2024NewsroomEnd-to-End Encryption / Privacy
European Police Chiefs said that the complementary partnership between law enforcement agencies and the technology industry is at...
Learn Proactive Supply Chain Threat Hunting Techniques
Apr 23, 2024The Hacker NewsThreat Hunting / Software Security
In the high-stakes world of cybersecurity, the battleground has shifted. Supply chain attacks have emerged...
Latest articles