A suspected state-aligned threat actor has been linked to a new wave of attacks targeting government entities in Europe and the United States using the Microsoft Office “Follina” vulnerability. Proofpoint, an enterprise security firm, said it blocked attempts to exploit…
Latest posts - Page 57
Evasive phishing employs reverse tunnels and URL shortening services
Researchers are seeing an increase in the use of reverse tunnel services, as well as URL shorteners, for large-scale phishing campaigns, making the malicious activity more difficult to detect. This practise differs from the more common practice of registering domains…
Spam campaign using SVCReady malware
A new phishing campaign using SVCReady, a known malware, has been observed. “The malware is notable for the unusual way it is delivered to target PCs — using shellcode hidden in the properties of Microsoft Office documents,” Patrick Schläpfer, a…
Critical flaw was found inside the UNISOC smartphone chip
Check Point Research was the one who found the flaw. UNISOC handles 11% of all smartphones in the globe. Check Point Research has discovered a significant security flaw in UNISOC’s smartphone chip, which is responsible for cellular connection in 11%…
Bored Ape Yacht club hacked third time this year
Threat actors took over Bored Ape Yacht Club (BAYC) for the third time this year. They have stolen and sold NFTs worth $250,000 or 142 ETH. The attacker used a phishing attack and established a phishing site that mimicked the…
Foxconn confirms ransomware attack halted the production in Mexico
A ransomware attack on one of Foxconn’s Mexico-based production factories occurred in late May, according to the electronics maker. The organisation could not offer any information about the attackers, but the LockBit ransomware gang claimed responsibility for the incident. Foxconn…
Researchers discover Malware controlling thousands of websites in the Parrot TDS network
The Parrot traffic direction system(TDS), which was reported earlier this year, had a more profound impact than thought before, research stated. Since February 2019, Sucuri has been following the campaign under the name “”NDSW/NDSX” and stated that “the malware was…
Conti leaks point to ransomware groups’ interest in firmware attacks
Earlier this year, a study of leaked chats of the infamous Conti ransomware group suggests that the syndicate has been working on a set of firmware attack methods accessing privileged code on affected devices. “Control over firmware gives attackers virtually…
Multiple Vulnerabilities are discovered In Open Automation Software (OAS) Platform
Open Automation Software, a major ICS platform, has a number of security flaws, according to researchers (OAS). Exploiting these flaws could lead to the execution of arbitrary code on a target device. With the latest OAS Platform upgrades, the vendors…
Cyberattacks rock Costa Rica’s healthcare system
Early Tuesday morning, Hospitals and clinics were hit by a cyberattack, said the Costa Rican Social Security Fund (CCSS). The attack was one among many attacks that have lately targeted the Central American country. CCSS had to shut down its…