Malware & Threats

P2Pinfect Worm Now Dropping Ransomware on Redis Servers

P2Pinfect Worm Now Dropping Ransomware on Redis Servers 2024-06-26 at 15:16 By Ionut Arghire The P2Pinfect worm targeting Redis servers has been updated with ransomware and cryptocurrency mining payloads. The post P2Pinfect Worm Now Dropping Ransomware on Redis Servers appeared first on SecurityWeek. This article is an excerpt from SecurityWeek RSS Feed View Original Source […]

React to this headline:

Loading spinner

P2Pinfect Worm Now Dropping Ransomware on Redis Servers Read More »

Recent Zyxel NAS Vulnerability Exploited by Botnet

Recent Zyxel NAS Vulnerability Exploited by Botnet 2024-06-25 at 16:46 By Ionut Arghire A Mirai-like botnet has started exploiting a critical-severity vulnerability in discontinued Zyxel NAS products. The post Recent Zyxel NAS Vulnerability Exploited by Botnet appeared first on SecurityWeek. This article is an excerpt from SecurityWeek RSS Feed View Original Source React to this

React to this headline:

Loading spinner

Recent Zyxel NAS Vulnerability Exploited by Botnet Read More »

Long-Running Chinese Espionage Campaign Targets Telecom Firms in Asian Country

Long-Running Chinese Espionage Campaign Targets Telecom Firms in Asian Country 2024-06-20 at 19:01 By Ionut Arghire A years-long espionage campaign has targeted telecoms companies in Asia with tools associated with Chinese groups. The post Long-Running Chinese Espionage Campaign Targets Telecom Firms in Asian Country appeared first on SecurityWeek. This article is an excerpt from SecurityWeek

React to this headline:

Loading spinner

Long-Running Chinese Espionage Campaign Targets Telecom Firms in Asian Country Read More »

Highly Evasive SquidLoader Malware Targets China

Highly Evasive SquidLoader Malware Targets China 2024-06-20 at 15:31 By Ionut Arghire A threat actor targeting Chinese-speaking victims has been using the SquidLoader malware loader in recent attacks. The post Highly Evasive SquidLoader Malware Targets China appeared first on SecurityWeek. This article is an excerpt from SecurityWeek RSS Feed View Original Source React to this

React to this headline:

Loading spinner

Highly Evasive SquidLoader Malware Targets China Read More »

Chinese Hackers Leveraged Legacy F5 BIG-IP Appliance for Persistence

Chinese Hackers Leveraged Legacy F5 BIG-IP Appliance for Persistence 2024-06-18 at 19:45 By Ionut Arghire China-linked threat actor Velvet Ant leveraged a legacy F5 BIG-IP appliance for three-year access to a victim’s network. The post Chinese Hackers Leveraged Legacy F5 BIG-IP Appliance for Persistence appeared first on SecurityWeek. This article is an excerpt from SecurityWeek

React to this headline:

Loading spinner

Chinese Hackers Leveraged Legacy F5 BIG-IP Appliance for Persistence Read More »

New BadSpace Backdoor Deployed in Drive-By Attacks

New BadSpace Backdoor Deployed in Drive-By Attacks 2024-06-18 at 19:45 By Ionut Arghire The BadSpace backdoor is being distributed via drive-by attacks involving infected websites and JavaScript downloaders. The post New BadSpace Backdoor Deployed in Drive-By Attacks appeared first on SecurityWeek. This article is an excerpt from SecurityWeek RSS Feed View Original Source React to

React to this headline:

Loading spinner

New BadSpace Backdoor Deployed in Drive-By Attacks Read More »

Pakistani Threat Actors Caught Targeting Indian Gov Entities

Pakistani Threat Actors Caught Targeting Indian Gov Entities 2024-06-14 at 17:31 By Ionut Arghire Security researchers at Cisco Talos and Volexity flag two Pakistani espionage campaigns targeting Indian government entities. The post Pakistani Threat Actors Caught Targeting Indian Gov Entities appeared first on SecurityWeek. This article is an excerpt from SecurityWeek RSS Feed View Original

React to this headline:

Loading spinner

Pakistani Threat Actors Caught Targeting Indian Gov Entities Read More »

CISA Warns of Progress Telerik Vulnerability Exploitation

CISA Warns of Progress Telerik Vulnerability Exploitation 2024-06-14 at 13:46 By Ionut Arghire CISA urges federal agencies to apply mitigations for an exploited Progress Telerik vulnerability as soon as possible. The post CISA Warns of Progress Telerik Vulnerability Exploitation appeared first on SecurityWeek. This article is an excerpt from SecurityWeek RSS Feed View Original Source

React to this headline:

Loading spinner

CISA Warns of Progress Telerik Vulnerability Exploitation Read More »

Google Warns of Pixel Firmware Zero-Day Under Limited, Targeted Exploitation

Google Warns of Pixel Firmware Zero-Day Under Limited, Targeted Exploitation 2024-06-12 at 21:16 By Ryan Naraine The zero-day is tagged as CVE-2024-32896 and described as an elevation of privilege issue in Pixel Firmware. The post Google Warns of Pixel Firmware Zero-Day Under Limited, Targeted Exploitation appeared first on SecurityWeek. This article is an excerpt from

React to this headline:

Loading spinner

Google Warns of Pixel Firmware Zero-Day Under Limited, Targeted Exploitation Read More »

Patch Tuesday: Remote Code Execution Flaw in Microsoft Message Queuing

Patch Tuesday: Remote Code Execution Flaw in Microsoft Message Queuing 2024-06-12 at 00:46 By Ryan Naraine The Windows vulnerability carries a CVSS severity score of 9.8/10 and can be exploited by via specially crafted malicious MSMQ packets. The post Patch Tuesday: Remote Code Execution Flaw in Microsoft Message Queuing appeared first on SecurityWeek. This article

React to this headline:

Loading spinner

Patch Tuesday: Remote Code Execution Flaw in Microsoft Message Queuing Read More »

Adobe Plugs Code Execution Holes in After Effects, Illustrator

Adobe Plugs Code Execution Holes in After Effects, Illustrator 2024-06-11 at 21:46 By Ryan Naraine Patch Tuesday: Adobe fixes critical flaws and warns of the risk of code execution attacks on Windows and macOS platforms. The post Adobe Plugs Code Execution Holes in After Effects, Illustrator appeared first on SecurityWeek. This article is an excerpt

React to this headline:

Loading spinner

Adobe Plugs Code Execution Holes in After Effects, Illustrator Read More »

Arm Warns of Exploited Kernel Driver Vulnerability

Arm Warns of Exploited Kernel Driver Vulnerability 2024-06-11 at 13:16 By Ionut Arghire Arm warns that CVE-2024-4610, a Mali GPU kernel driver vulnerability addressed two years ago, is exploited in attacks. The post Arm Warns of Exploited Kernel Driver Vulnerability appeared first on SecurityWeek. This article is an excerpt from SecurityWeek RSS Feed View Original

React to this headline:

Loading spinner

Arm Warns of Exploited Kernel Driver Vulnerability Read More »

Chinese Hackers Exploit Old ThinkPHP Vulnerabilities in New Attacks

Chinese Hackers Exploit Old ThinkPHP Vulnerabilities in New Attacks 2024-06-06 at 20:33 By Ionut Arghire Akamai warns that a Chinese threat actor is exploiting years-old remote code execution vulnerabilities in ThinkPHP in new attacks. The post Chinese Hackers Exploit Old ThinkPHP Vulnerabilities in New Attacks appeared first on SecurityWeek. This article is an excerpt from

React to this headline:

Loading spinner

Chinese Hackers Exploit Old ThinkPHP Vulnerabilities in New Attacks Read More »

Google, Microsoft: Russian Threat Actors Pose High Risk to 2024 Paris Olympics

Google, Microsoft: Russian Threat Actors Pose High Risk to 2024 Paris Olympics 2024-06-06 at 16:46 By Ionut Arghire Google and Microsoft warn of elevated risks of cyber threats facing the 2024 Paris Olympics, especially from Russian threat actors. The post Google, Microsoft: Russian Threat Actors Pose High Risk to 2024 Paris Olympics appeared first on

React to this headline:

Loading spinner

Google, Microsoft: Russian Threat Actors Pose High Risk to 2024 Paris Olympics Read More »

Multiple Chinese APTs Targeted Southeast Asian Government for Two Years

Multiple Chinese APTs Targeted Southeast Asian Government for Two Years 2024-06-06 at 14:46 By Ionut Arghire Multiple Chinese state-sponsored groups have targeted a Southeast Asian government in a years-long cyberespionage campaign. The post Multiple Chinese APTs Targeted Southeast Asian Government for Two Years appeared first on SecurityWeek. This article is an excerpt from SecurityWeek RSS

React to this headline:

Loading spinner

Multiple Chinese APTs Targeted Southeast Asian Government for Two Years Read More »

Researchers Show How Malware Could Steal Windows Recall Data

Researchers Show How Malware Could Steal Windows Recall Data 2024-06-05 at 16:31 By Eduard Kovacs Cybersecurity researchers are demonstrating how malware could steal data collected by the new Windows Recall feature. The post Researchers Show How Malware Could Steal Windows Recall Data appeared first on SecurityWeek. This article is an excerpt from SecurityWeek RSS Feed

React to this headline:

Loading spinner

Researchers Show How Malware Could Steal Windows Recall Data Read More »

CISA Warns of Attacks Exploiting Old Oracle WebLogic Vulnerability

CISA Warns of Attacks Exploiting Old Oracle WebLogic Vulnerability 2024-06-04 at 15:46 By Eduard Kovacs CISA has added an old Oracle WebLogic flaw tracked as CVE-2017-3506 to its known exploited vulnerabilities catalog. The post CISA Warns of Attacks Exploiting Old Oracle WebLogic Vulnerability appeared first on SecurityWeek. This article is an excerpt from SecurityWeek RSS

React to this headline:

Loading spinner

CISA Warns of Attacks Exploiting Old Oracle WebLogic Vulnerability Read More »

Identities of Cybercriminals Linked to Malware Loaders Revealed

Identities of Cybercriminals Linked to Malware Loaders Revealed 2024-06-03 at 16:46 By Ionut Arghire Law enforcement reveals the identities of eight cybercriminals linked to recently disrupted malware loaders. The post Identities of Cybercriminals Linked to Malware Loaders Revealed appeared first on SecurityWeek. This article is an excerpt from SecurityWeek RSS Feed View Original Source React

React to this headline:

Loading spinner

Identities of Cybercriminals Linked to Malware Loaders Revealed Read More »

PoC Published for Exploited Check Point VPN Vulnerability

PoC Published for Exploited Check Point VPN Vulnerability 2024-06-03 at 15:46 By Ionut Arghire PoC code targeting a recent Check Point VPN zero-day has been released as Censys identifies 14,000 internet-accessible appliances. The post PoC Published for Exploited Check Point VPN Vulnerability appeared first on SecurityWeek. This article is an excerpt from SecurityWeek RSS Feed

React to this headline:

Loading spinner

PoC Published for Exploited Check Point VPN Vulnerability Read More »

Mysterious Threat Actor Used Chalubo Malware to Brick 600,000 Routers

Mysterious Threat Actor Used Chalubo Malware to Brick 600,000 Routers 2024-05-31 at 14:46 By Ionut Arghire Over 600,000 SOHO routers belonging to a single ISP and infected with the Chalubo trojan were rendered inoperable. The post Mysterious Threat Actor Used Chalubo Malware to Brick 600,000 Routers appeared first on SecurityWeek. This article is an excerpt

React to this headline:

Loading spinner

Mysterious Threat Actor Used Chalubo Malware to Brick 600,000 Routers Read More »

Scroll to Top