Malware & Threats

Critical WordPress Plugin Flaws Exploited to Inject Malicious Scripts and Backdoors

Critical WordPress Plugin Flaws Exploited to Inject Malicious Scripts and Backdoors 2024-05-30 at 18:17 By Ionut Arghire Malicious campaign exploits high-severity XSS flaws in three WordPress plugins to backdoor websites. The post Critical WordPress Plugin Flaws Exploited to Inject Malicious Scripts and Backdoors appeared first on SecurityWeek. This article is an excerpt from SecurityWeek RSS […]

React to this headline:

Loading spinner

Critical WordPress Plugin Flaws Exploited to Inject Malicious Scripts and Backdoors Read More »

TrickBot and Other Malware Droppers Disrupted by Law Enforcement

TrickBot and Other Malware Droppers Disrupted by Law Enforcement 2024-05-30 at 15:32 By Ionut Arghire The TrickBot botnet and other malware droppers have been targeted by international law enforcement in Operation Endgame. The post TrickBot and Other Malware Droppers Disrupted by Law Enforcement appeared first on SecurityWeek. This article is an excerpt from SecurityWeek RSS

React to this headline:

Loading spinner

TrickBot and Other Malware Droppers Disrupted by Law Enforcement Read More »

Okta Warns of Credential Stuffing Attacks Targeting Cross-Origin Authentication

Okta Warns of Credential Stuffing Attacks Targeting Cross-Origin Authentication 2024-05-30 at 15:01 By Ionut Arghire Okta raises the alarm on credential stuffing attacks targeting endpoints used for cross-origin authentication. The post Okta Warns of Credential Stuffing Attacks Targeting Cross-Origin Authentication appeared first on SecurityWeek. This article is an excerpt from SecurityWeek RSS Feed View Original

React to this headline:

Loading spinner

Okta Warns of Credential Stuffing Attacks Targeting Cross-Origin Authentication Read More »

Massive 911 S5 Botnet Dismantled, Chinese Mastermind Arrested

Massive 911 S5 Botnet Dismantled, Chinese Mastermind Arrested 2024-05-30 at 15:01 By Eduard Kovacs The US announced that the 911 S5 (Cloud Router) botnet, likely the world’s largest, has been dismantled and its administrator arrested. The post Massive 911 S5 Botnet Dismantled, Chinese Mastermind Arrested appeared first on SecurityWeek. This article is an excerpt from

React to this headline:

Loading spinner

Massive 911 S5 Botnet Dismantled, Chinese Mastermind Arrested Read More »

Check Point VPN Attacks Involve Zero-Day Exploited Since April

Check Point VPN Attacks Involve Zero-Day Exploited Since April 2024-05-30 at 12:46 By Eduard Kovacs The recently disclosed Check Point VPN attacks involve the zero-day vulnerability CVE-2024-24919, which allows hackers to obtain passwords. The post Check Point VPN Attacks Involve Zero-Day Exploited Since April appeared first on SecurityWeek. This article is an excerpt from SecurityWeek

React to this headline:

Loading spinner

Check Point VPN Attacks Involve Zero-Day Exploited Since April Read More »

JAVS Courtroom Audio-Visual Software Installer Serves Backdoor

JAVS Courtroom Audio-Visual Software Installer Serves Backdoor 2024-05-24 at 16:31 By Ionut Arghire Backdoored JAVS courtroom recording and management software installer puts thousands at risk of complete takeover. The post JAVS Courtroom Audio-Visual Software Installer Serves Backdoor appeared first on SecurityWeek. This article is an excerpt from SecurityWeek RSS Feed View Original Source React to

React to this headline:

Loading spinner

JAVS Courtroom Audio-Visual Software Installer Serves Backdoor Read More »

Microsoft Quick Assist Tool Abused for Ransomware Delivery

Microsoft Quick Assist Tool Abused for Ransomware Delivery 2024-05-17 at 14:46 By Ionut Arghire The Black Basta group abuses remote connection tool Quick Assist in vishing attacks leading to ransomware deployment. The post Microsoft Quick Assist Tool Abused for Ransomware Delivery appeared first on SecurityWeek. This article is an excerpt from SecurityWeek RSS Feed View

React to this headline:

Loading spinner

Microsoft Quick Assist Tool Abused for Ransomware Delivery Read More »

New ‘Antidot’ Android Trojan Allows Cybercriminals to Hack Devices, Steal Data

New ‘Antidot’ Android Trojan Allows Cybercriminals to Hack Devices, Steal Data 2024-05-17 at 14:46 By Ionut Arghire The Antidot Android banking trojan snoops on users and steals their credentials, contacts, and SMS messages. The post New ‘Antidot’ Android Trojan Allows Cybercriminals to Hack Devices, Steal Data appeared first on SecurityWeek. This article is an excerpt

React to this headline:

Loading spinner

New ‘Antidot’ Android Trojan Allows Cybercriminals to Hack Devices, Steal Data Read More »

Threat Actors Abuse GitHub to Distribute Multiple Information Stealers

Threat Actors Abuse GitHub to Distribute Multiple Information Stealers 2024-05-15 at 18:31 By Ionut Arghire Russian-speaking threat actors are caught abusing a GitHub profile to distribute information stealers posing as legitimate software. The post Threat Actors Abuse GitHub to Distribute Multiple Information Stealers appeared first on SecurityWeek. This article is an excerpt from SecurityWeek RSS

React to this headline:

Loading spinner

Threat Actors Abuse GitHub to Distribute Multiple Information Stealers Read More »

400,000 Linux Servers Hit by Ebury Botnet 

400,000 Linux Servers Hit by Ebury Botnet  2024-05-15 at 15:01 By Ionut Arghire The Ebury Linux botnet has ensnared over 400,000 Linux systems in 15 years, with roughly 100,000 still infected. The post 400,000 Linux Servers Hit by Ebury Botnet  appeared first on SecurityWeek. This article is an excerpt from SecurityWeek RSS Feed View Original

React to this headline:

Loading spinner

400,000 Linux Servers Hit by Ebury Botnet  Read More »

Microsoft Warns of Active Zero-Day Exploitation, Patches 60 Windows Vulnerabilities

Microsoft Warns of Active Zero-Day Exploitation, Patches 60 Windows Vulnerabilities 2024-05-14 at 22:47 By Ryan Naraine Patch Tuesday: Microsoft documents 60 security flaws in multiple software products and flags an actively exploited Windows zero-day for urgent attention. The post Microsoft Warns of Active Zero-Day Exploitation, Patches 60 Windows Vulnerabilities appeared first on SecurityWeek. This article

React to this headline:

Loading spinner

Microsoft Warns of Active Zero-Day Exploitation, Patches 60 Windows Vulnerabilities Read More »

Adobe Patches Critical Flaws in Reader, Acrobat

Adobe Patches Critical Flaws in Reader, Acrobat 2024-05-14 at 21:01 By Ryan Naraine Adobe documents multiple code execution flaws in a wide range of products, including the widely deployed Adobe Acrobat and Reader software. The post Adobe Patches Critical Flaws in Reader, Acrobat appeared first on SecurityWeek. This article is an excerpt from SecurityWeek RSS

React to this headline:

Loading spinner

Adobe Patches Critical Flaws in Reader, Acrobat Read More »

Attackers Use DNS Tunneling to Track Victim Activity, Scan Networks

Attackers Use DNS Tunneling to Track Victim Activity, Scan Networks 2024-05-14 at 15:31 By Ionut Arghire Threat actors are using DNS tunneling to track victims’ interaction with spam and to scan network infrastructures. The post Attackers Use DNS Tunneling to Track Victim Activity, Scan Networks appeared first on SecurityWeek. This article is an excerpt from

React to this headline:

Loading spinner

Attackers Use DNS Tunneling to Track Victim Activity, Scan Networks Read More »

Apple Patch Day: Code Execution Flaws in iPhones, iPads, macOS

Apple Patch Day: Code Execution Flaws in iPhones, iPads, macOS 2024-05-13 at 23:01 By Ryan Naraine Apple documents another zero-day flaw being exploited on older iPhones and documents security problems in macOS, iOS and iPadOS. The post Apple Patch Day: Code Execution Flaws in iPhones, iPads, macOS appeared first on SecurityWeek. This article is an

React to this headline:

Loading spinner

Apple Patch Day: Code Execution Flaws in iPhones, iPads, macOS Read More »

US Says North Korean Hackers Exploiting Weak DMARC Settings 

US Says North Korean Hackers Exploiting Weak DMARC Settings  2024-05-03 at 19:16 By Ionut Arghire The US government warns of a North Korean threat actor abusing weak email DMARC settings to hide spear-phishing attacks. The post US Says North Korean Hackers Exploiting Weak DMARC Settings  appeared first on SecurityWeek. This article is an excerpt from

React to this headline:

Loading spinner

US Says North Korean Hackers Exploiting Weak DMARC Settings  Read More »

Botnet Disrupted by FBI Still Used by Russian Spies, Cybercriminals

Botnet Disrupted by FBI Still Used by Russian Spies, Cybercriminals 2024-05-03 at 17:09 By Ionut Arghire A botnet dismantled in January and used by Russia-linked APT28 consisted of more than just Ubiquiti Edge OS routers. The post Botnet Disrupted by FBI Still Used by Russian Spies, Cybercriminals appeared first on SecurityWeek. This article is an

React to this headline:

Loading spinner

Botnet Disrupted by FBI Still Used by Russian Spies, Cybercriminals Read More »

Google Boosts Bug Bounty Payouts Tenfold in Mobile App Security Push

Google Boosts Bug Bounty Payouts Tenfold in Mobile App Security Push 2024-05-01 at 18:33 By Ionut Arghire Researchers can earn as much as $450,000 for a single vulnerability report as Google boosts its mobile vulnerability rewards program. The post Google Boosts Bug Bounty Payouts Tenfold in Mobile App Security Push appeared first on SecurityWeek. This

React to this headline:

Loading spinner

Google Boosts Bug Bounty Payouts Tenfold in Mobile App Security Push Read More »

Cuttlefish Malware Targets Routers, Harvests Cloud Authentication Data 

Cuttlefish Malware Targets Routers, Harvests Cloud Authentication Data  2024-05-01 at 18:33 By Ryan Naraine Cuttlefish malware platform roaming around enterprise SOHO routers capable of covertly harvesting public cloud authentication data from internet traffic. The post Cuttlefish Malware Targets Routers, Harvests Cloud Authentication Data  appeared first on SecurityWeek. This article is an excerpt from SecurityWeek RSS

React to this headline:

Loading spinner

Cuttlefish Malware Targets Routers, Harvests Cloud Authentication Data  Read More »

Wpeeper Android Trojan Uses Compromised WordPress Sites to Shield Command-and-Control Server

Wpeeper Android Trojan Uses Compromised WordPress Sites to Shield Command-and-Control Server 2024-05-01 at 15:31 By Ionut Arghire The new Wpeeper Android trojan ceased operations after a week and has zero detections in VirusTotal. The post Wpeeper Android Trojan Uses Compromised WordPress Sites to Shield Command-and-Control Server appeared first on SecurityWeek. This article is an excerpt

React to this headline:

Loading spinner

Wpeeper Android Trojan Uses Compromised WordPress Sites to Shield Command-and-Control Server Read More »

Critical Vulnerabilities in Judge0 Lead to Sandbox Escape, Host Takeover

Critical Vulnerabilities in Judge0 Lead to Sandbox Escape, Host Takeover 2024-04-30 at 20:46 By Ionut Arghire Three vulnerabilities in the Judge0 open source service could allow attackers to escape the sandbox and obtain root privileges on the host. The post Critical Vulnerabilities in Judge0 Lead to Sandbox Escape, Host Takeover appeared first on SecurityWeek. This

React to this headline:

Loading spinner

Critical Vulnerabilities in Judge0 Lead to Sandbox Escape, Host Takeover Read More »

Scroll to Top