Malware & Threats

Exploitation of Palo Alto Firewall Vulnerability Picking Up After PoC Release

Exploitation of Palo Alto Firewall Vulnerability Picking Up After PoC Release 2024-04-17 at 14:31 By Eduard Kovacs Palo Alto Networks firewall vulnerability CVE-2024-3400 increasingly exploited after PoC code has been released.  The post Exploitation of Palo Alto Firewall Vulnerability Picking Up After PoC Release appeared first on SecurityWeek. This article is an excerpt from SecurityWeek […]

React to this headline:

Loading spinner

Exploitation of Palo Alto Firewall Vulnerability Picking Up After PoC Release Read More »

Palo Alto Networks Releases Fixes for Firewall Zero-Day as First Attribution Attempts Emerge

Palo Alto Networks Releases Fixes for Firewall Zero-Day as First Attribution Attempts Emerge 2024-04-15 at 14:00 By Eduard Kovacs Palo Alto Networks has started releasing hotfixes for the firewall zero-day CVE-2024-3400, which some have linked to North Korea’s Lazarus.  The post Palo Alto Networks Releases Fixes for Firewall Zero-Day as First Attribution Attempts Emerge appeared

React to this headline:

Loading spinner

Palo Alto Networks Releases Fixes for Firewall Zero-Day as First Attribution Attempts Emerge Read More »

State-Sponsored Hackers Exploit Zero-Day to Backdoor Palo Alto Networks Firewalls

State-Sponsored Hackers Exploit Zero-Day to Backdoor Palo Alto Networks Firewalls 2024-04-12 at 23:46 By Ionut Arghire A state-sponsored threat actor has been exploiting a zero-day in Palo Alto Networks firewalls for the past two weeks. The post State-Sponsored Hackers Exploit Zero-Day to Backdoor Palo Alto Networks Firewalls appeared first on SecurityWeek. This article is an

React to this headline:

Loading spinner

State-Sponsored Hackers Exploit Zero-Day to Backdoor Palo Alto Networks Firewalls Read More »

Threat Actors Manipulate GitHub Search to Deliver Malware

Threat Actors Manipulate GitHub Search to Deliver Malware 2024-04-12 at 14:31 By Ionut Arghire Checkmarx warns of a new attack relying on GitHub search manipulation to deliver malicious code. The post Threat Actors Manipulate GitHub Search to Deliver Malware appeared first on SecurityWeek. This article is an excerpt from SecurityWeek RSS Feed View Original Source

React to this headline:

Loading spinner

Threat Actors Manipulate GitHub Search to Deliver Malware Read More »

CISA Releases Malware Next-Gen Analysis System for Public Use

CISA Releases Malware Next-Gen Analysis System for Public Use 2024-04-10 at 23:17 By Ryan Naraine CISA’s Malware Next-Gen system is now available for any organization to submit malware samples and other suspicious artifacts for analysis. The post CISA Releases Malware Next-Gen Analysis System for Public Use appeared first on SecurityWeek. This article is an excerpt

React to this headline:

Loading spinner

CISA Releases Malware Next-Gen Analysis System for Public Use Read More »

Microsoft Patches Two Zero-Days Exploited for Malware Delivery

Microsoft Patches Two Zero-Days Exploited for Malware Delivery 2024-04-10 at 13:27 By Eduard Kovacs Microsoft patches CVE-2024-29988 and CVE-2024-26234, two zero-day vulnerabilities exploited by threat actors to deliver malware. The post Microsoft Patches Two Zero-Days Exploited for Malware Delivery appeared first on SecurityWeek. This article is an excerpt from SecurityWeek RSS Feed View Original Source

React to this headline:

Loading spinner

Microsoft Patches Two Zero-Days Exploited for Malware Delivery Read More »

Patch Tuesday: Code Execution Flaws in Multiple Adobe Software Products

Patch Tuesday: Code Execution Flaws in Multiple Adobe Software Products 2024-04-09 at 20:47 By Ryan Naraine Adobe calls attention to a pair of code execution bugs in Adobe Commerce and Magento Open Source, a product used to manage online stories. The post Patch Tuesday: Code Execution Flaws in Multiple Adobe Software Products appeared first on SecurityWeek. This

React to this headline:

Loading spinner

Patch Tuesday: Code Execution Flaws in Multiple Adobe Software Products Read More »

Magento Vulnerability Exploited to Deploy Persistent Backdoor

Magento Vulnerability Exploited to Deploy Persistent Backdoor 2024-04-05 at 14:16 By Ionut Arghire Attackers are exploiting a recent Magento vulnerability to deploy a persistent backdoor on ecommerce websites. The post Magento Vulnerability Exploited to Deploy Persistent Backdoor appeared first on SecurityWeek. This article is an excerpt from SecurityWeek RSS Feed View Original Source React to

React to this headline:

Loading spinner

Magento Vulnerability Exploited to Deploy Persistent Backdoor Read More »

‘Vultur’ Android Malware Gets Extensive Device Interaction Capabilities

‘Vultur’ Android Malware Gets Extensive Device Interaction Capabilities 2024-04-01 at 19:31 By Ionut Arghire NCC Group researchers warn that the Android banking malware ‘Vultur’ has been updated with device interaction and file tampering capabilities. The post ‘Vultur’ Android Malware Gets Extensive Device Interaction Capabilities appeared first on SecurityWeek. This article is an excerpt from SecurityWeek

React to this headline:

Loading spinner

‘Vultur’ Android Malware Gets Extensive Device Interaction Capabilities Read More »

‘WallEscape’ Linux Vulnerability Leaks User Passwords

‘WallEscape’ Linux Vulnerability Leaks User Passwords 2024-04-01 at 19:31 By Ionut Arghire A vulnerability in util-linux, a core utilities package in Linux systems, allows attackers to leak user passwords and modify the clipboard. The post ‘WallEscape’ Linux Vulnerability Leaks User Passwords appeared first on SecurityWeek. This article is an excerpt from SecurityWeek RSS Feed View

React to this headline:

Loading spinner

‘WallEscape’ Linux Vulnerability Leaks User Passwords Read More »

In Other News: Airline Privacy Review, SEC’s SolarWinds Hack Probe, Apple MFA Bombing

In Other News: Airline Privacy Review, SEC’s SolarWinds Hack Probe, Apple MFA Bombing 2024-03-29 at 16:46 By SecurityWeek News Noteworthy stories that might have slipped under the radar: US government conducting airline privacy review, SEC’s overreaching SolarWinds hack probe, MFA bombing of Apple users. The post In Other News: Airline Privacy Review, SEC’s SolarWinds Hack

React to this headline:

Loading spinner

In Other News: Airline Privacy Review, SEC’s SolarWinds Hack Probe, Apple MFA Bombing Read More »

Malware Upload Attack Hits PyPI Repository

Malware Upload Attack Hits PyPI Repository 2024-03-28 at 20:31 By Ryan Naraine Maintainers of the Python Package Index (PyPI) repository were forced to suspend new project creation and new user registration to mitigate a malware upload campaign. The post Malware Upload Attack Hits PyPI Repository appeared first on SecurityWeek. This article is an excerpt from

React to this headline:

Loading spinner

Malware Upload Attack Hits PyPI Repository Read More »

Cyberespionage Campaign Targets Government, Energy Entities in India

Cyberespionage Campaign Targets Government, Energy Entities in India 2024-03-28 at 17:17 By Ionut Arghire Threat intelligence firm EclecticIQ documents the delivery of malware phishing lures to government and private energy organizations in India. The post Cyberespionage Campaign Targets Government, Energy Entities in India appeared first on SecurityWeek. This article is an excerpt from SecurityWeek RSS

React to this headline:

Loading spinner

Cyberespionage Campaign Targets Government, Energy Entities in India Read More »

VPN Apps on Google Play Turn Android Devices Into Proxies

VPN Apps on Google Play Turn Android Devices Into Proxies 2024-03-27 at 17:01 By Ionut Arghire Human Security identifies 28 VPN applications for Android and an SDK that turn devices into proxies. The post VPN Apps on Google Play Turn Android Devices Into Proxies appeared first on SecurityWeek. This article is an excerpt from SecurityWeek

React to this headline:

Loading spinner

VPN Apps on Google Play Turn Android Devices Into Proxies Read More »

Google Report: Despite Surge in Zero-Day Attacks, Exploit Mitigations Are Working

Google Report: Despite Surge in Zero-Day Attacks, Exploit Mitigations Are Working 2024-03-27 at 17:01 By Ryan Naraine Despite a surge in zero-day attacks, data shows that security investments into OS and software exploit mitigations are forcing attackers to find new attack surfaces and bug patterns. The post Google Report: Despite Surge in Zero-Day Attacks, Exploit

React to this headline:

Loading spinner

Google Report: Despite Surge in Zero-Day Attacks, Exploit Mitigations Are Working Read More »

Chrome Update Patches Zero-Day Vulnerabilities Exploited at Pwn2Own

Chrome Update Patches Zero-Day Vulnerabilities Exploited at Pwn2Own 2024-03-27 at 17:01 By Ionut Arghire Google ships a security-themed Chrome browser refresh to fix flaws exploited at the CanSecWest Pwn2Own hacking contest. The post Chrome Update Patches Zero-Day Vulnerabilities Exploited at Pwn2Own appeared first on SecurityWeek. This article is an excerpt from SecurityWeek RSS Feed View

React to this headline:

Loading spinner

Chrome Update Patches Zero-Day Vulnerabilities Exploited at Pwn2Own Read More »

Ray AI Framework Vulnerability Exploited to Hack Hundreds of Clusters

Ray AI Framework Vulnerability Exploited to Hack Hundreds of Clusters 2024-03-27 at 15:01 By Ionut Arghire Disputed Ray AI framework vulnerability exploited to steal information and deploy cryptominers on hundreds of clusters. The post Ray AI Framework Vulnerability Exploited to Hack Hundreds of Clusters appeared first on SecurityWeek. This article is an excerpt from SecurityWeek

React to this headline:

Loading spinner

Ray AI Framework Vulnerability Exploited to Hack Hundreds of Clusters Read More »

Researchers Discover 40,000-Strong EOL Router, IoT Botnet 

Researchers Discover 40,000-Strong EOL Router, IoT Botnet  2024-03-26 at 20:46 By Ryan Naraine Malware hunters sound an alarm after discovering a 40,000-strong botnet packed with end-of-life routers and IoT devices being used in cybercriminal activities. The post Researchers Discover 40,000-Strong EOL Router, IoT Botnet  appeared first on SecurityWeek. This article is an excerpt from SecurityWeek

React to this headline:

Loading spinner

Researchers Discover 40,000-Strong EOL Router, IoT Botnet  Read More »

Suspicious NuGet Package Harvesting Information From Industrial Systems

Suspicious NuGet Package Harvesting Information From Industrial Systems 2024-03-26 at 17:01 By Ionut Arghire A suspicious NuGet package likely targets developers working with technology from Chinese firm Bozhon. The post Suspicious NuGet Package Harvesting Information From Industrial Systems appeared first on SecurityWeek. This article is an excerpt from SecurityWeek RSS Feed View Original Source React

React to this headline:

Loading spinner

Suspicious NuGet Package Harvesting Information From Industrial Systems Read More »

Over 100 Organizations Targeted in Recent ‘StrelaStealer’ Attacks

Over 100 Organizations Targeted in Recent ‘StrelaStealer’ Attacks 2024-03-25 at 16:16 By Ionut Arghire More than 100 organizations in the US and EU have been targeted in recent StrelaStealer infostealer campaigns. The post Over 100 Organizations Targeted in Recent ‘StrelaStealer’ Attacks appeared first on SecurityWeek. This article is an excerpt from SecurityWeek RSS Feed View

React to this headline:

Loading spinner

Over 100 Organizations Targeted in Recent ‘StrelaStealer’ Attacks Read More »

Scroll to Top