Chinese project maintainer appears to have closed the public issue without offering a patch. Nepxion Discovery Software, an open-source project that offers functionality for…
Chinese
A new 0-day RCE vulnerability on Microsoft Exchange Server was used in a new attack campaign.
While providing security monitoring and incident response services around the beginning of August 2022, the GTSC SOC team learned that a vital infrastructure was…
Agent Tesla malware is distributed by cybercriminals using Quantum Builder, a product sold on the dark web.
Agent Tesla’s remote access trojan is distributed using Quantum Builder, a newly identified malware creator (RAT). When compared to earlier attacks of this type,…
New Go-based Malware Targeting Windows and Linux Systems, Researchers Warn
In recent months, Chaos, a new, multi-functional Go-based virus, has seen a sharp increase in volume to capture a variety of Windows, Linux, SOHO…
WeChat alerts users abroad that their personal information and browsing history are being transmitted to China.
WeChat, a Chinese social media site, informed that it stores data on China servers of users who are located outside of China. WeChat users…
Home office routers are being used by the malware ZuoRAT to spy on specific networks
Small office/home office (SOHO) routers have been singled out by a previously unknown remote access trojan known as ZuoRAT as part of a sophisticated…
VMware servers are still being compromised via Log4Shell exploits
Today, CISA issued a warning about threat actors continuing utilising the Log4Shell (CVE-2021-44228) remote code execution vulnerability to attack VMware Horizon and Unified Access…
State-sponsored hackers use Microsoft’s ‘Follina’ bug to target entities in Europe and the United States
A suspected state-aligned threat actor has been linked to a new wave of attacks targeting government entities in Europe and the United States using…
What Is the Risk of a Cyber Attack on Transportation?
If an attacker gains access to a transit agency’s networks, the consequences might be considerably more serious than server outages or exposed emails. Consider…
Leading the Next Waves of Botnet Attacks: Enemybot and Fodcha
Two botnets have been trying to infect people all over the world by exploiting flaws in modems, routers, and IoT devices. These botnets, which…