Cybersecurity researchers have thoroughly reported a “simple but efficient” persistence method used by a relatively new malware loader called “Colibri.” Colibri has been put…
General
North Korean hackers using infected wallet apps to steal crypto
The Lazarus Group, the government-backed North Korean hacking group, has been identified as operating an attack campaign that uses trojanized decentralized finance (DeFi) wallet…
The Cryptomining Attack Campaign of Mars Stealer Targets OpenOffice
Attacks using the popular Mars Stealer have been on the rise, according to researchers. Its popularity grew after the Raccoon Stealer was shut down…
New Android Spyware Discovered with C2 Server Linked to Turla Hackers
An Android spyware application was discovered that poses a “Process Manager” service to capture sensitive data from afflicted devices. The software, which has the…
Crypto Phishing Scam carried out as a result of a breach in Mailchimp’s system
On Monday, Mailchimp, an email marketing service, disclosed a data breach that compromised an internal tool, and the tool was used for unauthorised access…
The Beastmode DDoS Botnet is enslaving extra routers by exploiting new TOTOLINK bugs.
Between February and March 2022, a variant of the Mirai botnet known as Beastmode was observed using recently reported vulnerabilities in TOTOLINK routers to…
Apple device used for stalking
Police arrested a 19-year-old Tennessee man for stalking his partner using an Apple watch attached to the wheel of the partner’s car. According to…
Brokenwire Hack Prevents Charging of Electric Vehicles
Researchers from the University of Oxford in the United Kingdom and Switzerland’s Armasuisse federal agency have discovered a new attack method for remotely interrupting…
SQL injection protection in ImpressCMS could be evaded to execute RCE
Vulnerabilities found in ImpressCMS can allow an unauthorised attacker to circumvent the software’s SQL injection safeguards to execute codes remotely or Remote code execution…
Vmware Horizon servers continue to be exploited through log4j vulnerability
Attackers continue to target VMware Horizon servers, which many organizations use to securely access enterprise apps for remote workers. Attackers are exploiting the critical…