A group of threat actors formerly linked to the ShadowPad remote obtains Trojan (RAT) have switched to a new toolkit. They use the new…
Srivani Reddy
Latest posts - Page 20
WordPress Sites Affected by the WPGateway Plugin’s Zero-Day Vulnerability, over 280,000
WPGateway plugin, a premium WordPress plugin, has a zero-day vulnerability that is already being aggressively abused in the wild. This gives bad actors the…
A Xalan-J vulnerability could lead to arbitrary code execution
Different SAML implementations make use of open-source initiatives. Researchers caution that a flaw in the Apache project Xalan-J used by numerous SAML implementations leads…
Reverse tunnelling and URL shorteners are tools used by cybercriminals to run “nearly undetected” phishing attacks.
Threat actors can now avoid some of the most powerful phishing defences thanks to a new hacking approach. Criminal organizations are using a new…
Facebook programmers are unsure of the whereabouts of all user data.
According to Facebook, it takes a team of people to explain to you what information the firm has on you. Also where Facebook keeps…
The Log4j bug is being used by North Korean Lazarus hackers to attack US energy corporations.
Security researchers have connected the North Korean state-sponsored Lazarus hacking gang to a recent cyber espionage effort targeting energy suppliers in the United States,…
WeChat alerts users abroad that their personal information and browsing history are being transmitted to China.
WeChat, a Chinese social media site, informed that it stores data on China servers of users who are located outside of China. WeChat users…
Ransomware criminals are using a new, sporadic encryption technique.
A number of ransomware organizations utilize a fresh strategy sporadic encryption technique to speed up the encryption process. Also to decrease the chances of…
Phishing attacks using WeTransfer that uses the Lampion malware
Threat actors are now employing WeTransfer to spread the Lampion malware in bigger quantities as part of their phishing efforts. WeTransfer is a legitimate…
There have been reported new vulnerabilities in Baxter’s internet-connected infusion pumps
Baxter’s internet-connected infusion pumps utilized in clinical settings by healthcare providers to administer medication to patients, have been found to contain a number of…