Researchers from the University of Oxford in the United Kingdom and Switzerland’s Armasuisse federal agency have discovered a new attack method for remotely interrupting the charging of electric vehicles. The Brokenwire attack entails wirelessly transmitting malicious signals to the targeted…
Latest posts - Page 66
SQL injection protection in ImpressCMS could be evaded to execute RCE
Vulnerabilities found in ImpressCMS can allow an unauthorised attacker to circumvent the software’s SQL injection safeguards to execute codes remotely or Remote code execution (RCE), informs a security researcher. The vulnerabilities, CVE-2021-26599, an SQL injection flaw and an access control…
Vmware Horizon servers continue to be exploited through log4j vulnerability
Attackers continue to target VMware Horizon servers, which many organizations use to securely access enterprise apps for remote workers. Attackers are exploiting the critical Apache Log4j remote code execution vulnerability that came to the fore in December 2021. Sophos researchers…
Malware affects computers with cryptocurrency miners
An unknown threat actor has been employing a “ complex and powerful” malware loader for deploying cryptocurrency miners on affected systems and possibly allowing the theft of Discord tokens. “The evidence found on victim networks appears to indicate that the…
FataIRAT’s new variant used by Purple Fox malware operators
Purple Fox malware operators have expanded their malware arsenal and now possess a new variant of a remote access trojan FataIRAT. Further, at the same time, the operators have improved their evasive capabilities to bypass security software. “Users’ machines are…
Attacks targeting Android and iPhone users for stealing cryptocurrency uncovered
Researchers have uncovered a malicious scheme mainly directed towards Chinese users via fake apps on Android and iOS that resemble genuine digital wallet services to steal cryptocurrency funds. “These malicious apps were able to steal victims’ secret seed phrases by…
Azure developers targeted by more than 200 NPM malicious packages
A new massive supply chain attack targeting Azure developers for stealing personal information has deployed more than 218 malicious NPM packages. “After manually inspecting some of these packages, it became apparent that this was a targeted attack against the entire…
BitRAT Spreads as Windows 10 license activator over the Internet as a cheap and elusive
Analysts from AhnLab, a company specialized in cybersecurity, revealed the spread of a new but already known virus called BitRAT. What is BitRAT? BitRAT, a malware classified as a Remote Access Trojan (RAT) is being distributed to users looking to…
A New Backdoor and a Unique Attack Chain – Slithering Serpent
A new email campaign attacking French entities uses a highly evasive attack chain. The phishing campaign is installing a new backdoor named Serpent. Initial details The sophisticated threat actor is leveraging a unique amalgamation of open-source software, which is a…
Botnet Malware jeopardises over 2,00,000 Mikro Tik routers
Mikro Tik’s vulnerable routers have been used in one of the largest botnet-as-a-service cybercrime, according to cybersecurity researchers. Avast published a new piece of research that states a cryptocurrency mining attack using the new-disrupted Glupteba botnet and the infamous TrickBot…