A malvertising threat has been rising since its emergence earlier this year. The malware, known as ChromeLoader, is a “pervasive and persistent browser hijacker that modifies its victims’ browser settings and redirects user traffic to advertisement websites,” Aedan Russell of…
Latest posts - Page 58
The BPFDoor malware exploits a Solaris vulnerability to get root access.
According to new research, the threat actor behind the stealthy BPFdoor malware for Linux and Solaris exploited an existing weakness to gain persistence on targeted systems. BPFDoor is a custom backdoor that has been used in assaults on telecommunications, government,…
Database containing 142 million customer details of MGM resorts leaked on Telegram
On July 14th, 2020, Hackread.com reported that a hacker with the online handle of NightLion stole various databases from DataViper, a breach observing site. One of the affected databases belonged to MGM Resorts, which had 142 million customer data. NightLion,…
A new Unpatched Bug Allows Attackers to Steal Money from PayPal Users
According to a security researcher, an unpatched vulnerability in PayPal’s money transfer service could allow attackers to deceive victims into completing attacker-directed transactions with a single click. Clickjacking, also known as UI redressing, is a method of tricking an unwary…
The Snake Keylogger is spread via malicious PDFs.
The email campaign also made use of Microsoft Word, which exploited a 22-year-old Office RCE flaw. While most malicious e-mail campaigns employ Word documents to disguise and spread malware, researchers have uncovered that a recently discovered campaign combines a malicious…
Critical Vulnerability in Premium WordPress Themes Allows for Site Takeover
More than 90,000 websites are affected by the privilege escalation bug discovered in the Jupiter and JupiterX Core Plugin. According to scientists, a significant privilege escalation problem discovered in two themes used by over 90,000 WordPress web pages can allow…
IBM helps schools across the globe to build strong cybersecurity defenses
IBM has extended a program that improves cybersecurity defenses of public schools with$5 million in grants. On Tuesday, IBM announced that it would offer a $5 million grant to public schools, including K-12 institutions in the United States. IBM’s existing…
When Ransomware Attacks, How Do You Protect Your Data?
Ransomware is not a novel type of attack. Indeed, the first malware surfaced almost 30 years ago and was delivered using 5.25-inch floppy discs. The victim had to send money to a P.O. Box in Panama to pay the ransom.…
What Is the Risk of a Cyber Attack on Transportation?
If an attacker gains access to a transit agency’s networks, the consequences might be considerably more serious than server outages or exposed emails. Consider an attack on a transportation agency in charge of railway and subway routes. The consequences could…
An unpatched flaw can result in attackers stealing from PayPal users
A security researcher asserts that he has uncovered an unpatched flaw in PayPal’s money transfer service. The flaw can allow attackers to deceive victims into inadvertently completing attacker-directed transactions with a single click. Clickjacking, also goes by the name UI…