Researchers have found a new infostealer on cybercrime forums having innumerable features. It can not only pilfer victims’ data but also execute financial thefts…
General
Vulnerability in VirusTotal allows attackers to take control of unpatched third-party antivirus
Security researchers have revealed a security issue that could enable attackers to exploit the VirusTotal platform for remote code execution (RCE) on unpatched third-party…
FBI issues alert regarding BalckCat ransomware that has affected 60 organisations
The U.S. Federal Bureau of Investigation (FBI) has warned the public of the BlackCat ransomware-as-a-service (RaaS). The ransomware has affected 60 entities globally as…
Cryptocurrency miners have Dockers, AWS and Alibaba cloud in their crosshair
LemonDuck, a cross-platform cryptocurrency mining botnet, is attacking Docker to steal cryptocurrency on Linux systems. The attacks form part of a bigger malware campaign.…
Hackers infiltrate resumes sent to corporate hiring managers with the ‘More Eggs’ malware
A year after potential candidates looking for work on LinkedIn were tempted with weaponized job offers, a new series of phishing assaults carrying the…
Java encryption implementation error made it trivial to forge credentials
A critical flaw in the Java JDK’s handling of some encryption procedures makes it simple for attackers to create fake credentials. Oracle resolved the…
Android devices vulnerable to remote spying as flaws discovered in chipsets
Audio decoders of Qualcomm and Media Tek chips have been found to have three security vulnerabilities, and if the vulnerabilities are left unpatched, it…
Improved Evasion Tactics in a New SolarMarker Variant
An improved version of the SolarMarker malware has been described in detail by researchers. Improvements have been made, as well as new defence evasion…
Windows Print Spooler flaw exploited in the wild
The U.S Cybersecurity and Infrastructure Security Agency (CISA) has asked users to watch out for a vulnerability in the Windows Print Spooler. Although Microsoft…
Leading the Next Waves of Botnet Attacks: Enemybot and Fodcha
Two botnets have been trying to infect people all over the world by exploiting flaws in modems, routers, and IoT devices. These botnets, which…