This month has seen an increase in ChromeLoader malware detections. There has been a steady stream of attacks since the beginning of the year.…
Srivani Reddy
Latest posts - Page 38
Hacker Steals personal information of Hundreds of Verizon Employees
Information in the database could be utilised in social engineering and SIM switching attacks. A hacker stole a database containing hundreds of Verizon employees’…
The BPFDoor malware exploits a Solaris vulnerability to get root access.
According to new research, the threat actor behind the stealthy BPFdoor malware for Linux and Solaris exploited an existing weakness to gain persistence on…
A new Unpatched Bug Allows Attackers to Steal Money from PayPal Users
According to a security researcher, an unpatched vulnerability in PayPal’s money transfer service could allow attackers to deceive victims into completing attacker-directed transactions with…
The Snake Keylogger is spread via malicious PDFs.
The email campaign also made use of Microsoft Word, which exploited a 22-year-old Office RCE flaw. While most malicious e-mail campaigns employ Word documents…
Critical Vulnerability in Premium WordPress Themes Allows for Site Takeover
More than 90,000 websites are affected by the privilege escalation bug discovered in the Jupiter and JupiterX Core Plugin. According to scientists, a significant…
When Ransomware Attacks, How Do You Protect Your Data?
Ransomware is not a novel type of attack. Indeed, the first malware surfaced almost 30 years ago and was delivered using 5.25-inch floppy discs.…
What Is the Risk of a Cyber Attack on Transportation?
If an attacker gains access to a transit agency’s networks, the consequences might be considerably more serious than server outages or exposed emails. Consider…
New Sysrv Botnet Variant Hijacking Windows and Linux with Crypto Miners
Microsoft is warning of a new variant of the srv botnet that’s exploiting multiple security flaws in web applications and databases to install coin…
Researchers discovered a new way to run malware on iPhone even when it is turned off
A groundbreaking security assessment of iOS find my team discovered a new attack surface that allows hackers to tinker with the firmware and load…