A new phishing campaign using SVCReady, a known malware, has been observed. “The malware is notable for the unusual way it is delivered to…
Malware
Researchers discover Malware controlling thousands of websites in the Parrot TDS network
The Parrot traffic direction system(TDS), which was reported earlier this year, had a more profound impact than thought before, research stated. Since February 2019,…
A surge in ChromeLoader Malware hijacking user’s browsers
A malvertising threat has been rising since its emergence earlier this year. The malware, known as ChromeLoader, is a “pervasive and persistent browser hijacker…
Researchers discovered a new way to run malware on iPhone even when it is turned off
A groundbreaking security assessment of iOS find my team discovered a new attack surface that allows hackers to tinker with the firmware and load…
Malware being sold on Telegram as part of the “Eternity project”
An unknown threat actor has been identified as the developer of a malware toolkit called the “Eternity Project”. The malware allows professional and amateur…
Vulnerability in VirusTotal allows attackers to take control of unpatched third-party antivirus
Security researchers have revealed a security issue that could enable attackers to exploit the VirusTotal platform for remote code execution (RCE) on unpatched third-party…
FBI issues alert regarding BalckCat ransomware that has affected 60 organisations
The U.S. Federal Bureau of Investigation (FBI) has warned the public of the BlackCat ransomware-as-a-service (RaaS). The ransomware has affected 60 entities globally as…
Malware targeting, never before, AWS Lambda serverless platform uncovered
A new malware targeting Amazon Web Services (AWS) Lambda serverless computing platform has been detected. Called “Denonia,” after the name of the domain it…
Researchers reveal Colibri’s modus operandi
Cybersecurity researchers have thoroughly reported a “simple but efficient” persistence method used by a relatively new malware loader called “Colibri.” Colibri has been put…
SQL injection protection in ImpressCMS could be evaded to execute RCE
Vulnerabilities found in ImpressCMS can allow an unauthorised attacker to circumvent the software’s SQL injection safeguards to execute codes remotely or Remote code execution…