Malware & Threats

Microsoft Patches Two Zero-Days Exploited for Malware Delivery

Microsoft Patches Two Zero-Days Exploited for Malware Delivery 2024-04-10 at 13:27 By Eduard Kovacs Microsoft patches CVE-2024-29988 and CVE-2024-26234, two zero-day vulnerabilities exploited by threat actors to deliver malware. The post Microsoft Patches Two Zero-Days Exploited for Malware Delivery appeared first on SecurityWeek. This article is an excerpt from SecurityWeek RSS Feed View Original Source […]

React to this headline:

Loading spinner

Microsoft Patches Two Zero-Days Exploited for Malware Delivery Read More »

Patch Tuesday: Code Execution Flaws in Multiple Adobe Software Products

Patch Tuesday: Code Execution Flaws in Multiple Adobe Software Products 2024-04-09 at 20:47 By Ryan Naraine Adobe calls attention to a pair of code execution bugs in Adobe Commerce and Magento Open Source, a product used to manage online stories. The post Patch Tuesday: Code Execution Flaws in Multiple Adobe Software Products appeared first on SecurityWeek. This

React to this headline:

Loading spinner

Patch Tuesday: Code Execution Flaws in Multiple Adobe Software Products Read More »

Magento Vulnerability Exploited to Deploy Persistent Backdoor

Magento Vulnerability Exploited to Deploy Persistent Backdoor 2024-04-05 at 14:16 By Ionut Arghire Attackers are exploiting a recent Magento vulnerability to deploy a persistent backdoor on ecommerce websites. The post Magento Vulnerability Exploited to Deploy Persistent Backdoor appeared first on SecurityWeek. This article is an excerpt from SecurityWeek RSS Feed View Original Source React to

React to this headline:

Loading spinner

Magento Vulnerability Exploited to Deploy Persistent Backdoor Read More »

‘Vultur’ Android Malware Gets Extensive Device Interaction Capabilities

‘Vultur’ Android Malware Gets Extensive Device Interaction Capabilities 2024-04-01 at 19:31 By Ionut Arghire NCC Group researchers warn that the Android banking malware ‘Vultur’ has been updated with device interaction and file tampering capabilities. The post ‘Vultur’ Android Malware Gets Extensive Device Interaction Capabilities appeared first on SecurityWeek. This article is an excerpt from SecurityWeek

React to this headline:

Loading spinner

‘Vultur’ Android Malware Gets Extensive Device Interaction Capabilities Read More »

‘WallEscape’ Linux Vulnerability Leaks User Passwords

‘WallEscape’ Linux Vulnerability Leaks User Passwords 2024-04-01 at 19:31 By Ionut Arghire A vulnerability in util-linux, a core utilities package in Linux systems, allows attackers to leak user passwords and modify the clipboard. The post ‘WallEscape’ Linux Vulnerability Leaks User Passwords appeared first on SecurityWeek. This article is an excerpt from SecurityWeek RSS Feed View

React to this headline:

Loading spinner

‘WallEscape’ Linux Vulnerability Leaks User Passwords Read More »

In Other News: Airline Privacy Review, SEC’s SolarWinds Hack Probe, Apple MFA Bombing

In Other News: Airline Privacy Review, SEC’s SolarWinds Hack Probe, Apple MFA Bombing 2024-03-29 at 16:46 By SecurityWeek News Noteworthy stories that might have slipped under the radar: US government conducting airline privacy review, SEC’s overreaching SolarWinds hack probe, MFA bombing of Apple users. The post In Other News: Airline Privacy Review, SEC’s SolarWinds Hack

React to this headline:

Loading spinner

In Other News: Airline Privacy Review, SEC’s SolarWinds Hack Probe, Apple MFA Bombing Read More »

Malware Upload Attack Hits PyPI Repository

Malware Upload Attack Hits PyPI Repository 2024-03-28 at 20:31 By Ryan Naraine Maintainers of the Python Package Index (PyPI) repository were forced to suspend new project creation and new user registration to mitigate a malware upload campaign. The post Malware Upload Attack Hits PyPI Repository appeared first on SecurityWeek. This article is an excerpt from

React to this headline:

Loading spinner

Malware Upload Attack Hits PyPI Repository Read More »

Cyberespionage Campaign Targets Government, Energy Entities in India

Cyberespionage Campaign Targets Government, Energy Entities in India 2024-03-28 at 17:17 By Ionut Arghire Threat intelligence firm EclecticIQ documents the delivery of malware phishing lures to government and private energy organizations in India. The post Cyberespionage Campaign Targets Government, Energy Entities in India appeared first on SecurityWeek. This article is an excerpt from SecurityWeek RSS

React to this headline:

Loading spinner

Cyberespionage Campaign Targets Government, Energy Entities in India Read More »

VPN Apps on Google Play Turn Android Devices Into Proxies

VPN Apps on Google Play Turn Android Devices Into Proxies 2024-03-27 at 17:01 By Ionut Arghire Human Security identifies 28 VPN applications for Android and an SDK that turn devices into proxies. The post VPN Apps on Google Play Turn Android Devices Into Proxies appeared first on SecurityWeek. This article is an excerpt from SecurityWeek

React to this headline:

Loading spinner

VPN Apps on Google Play Turn Android Devices Into Proxies Read More »

Google Report: Despite Surge in Zero-Day Attacks, Exploit Mitigations Are Working

Google Report: Despite Surge in Zero-Day Attacks, Exploit Mitigations Are Working 2024-03-27 at 17:01 By Ryan Naraine Despite a surge in zero-day attacks, data shows that security investments into OS and software exploit mitigations are forcing attackers to find new attack surfaces and bug patterns. The post Google Report: Despite Surge in Zero-Day Attacks, Exploit

React to this headline:

Loading spinner

Google Report: Despite Surge in Zero-Day Attacks, Exploit Mitigations Are Working Read More »

Chrome Update Patches Zero-Day Vulnerabilities Exploited at Pwn2Own

Chrome Update Patches Zero-Day Vulnerabilities Exploited at Pwn2Own 2024-03-27 at 17:01 By Ionut Arghire Google ships a security-themed Chrome browser refresh to fix flaws exploited at the CanSecWest Pwn2Own hacking contest. The post Chrome Update Patches Zero-Day Vulnerabilities Exploited at Pwn2Own appeared first on SecurityWeek. This article is an excerpt from SecurityWeek RSS Feed View

React to this headline:

Loading spinner

Chrome Update Patches Zero-Day Vulnerabilities Exploited at Pwn2Own Read More »

Ray AI Framework Vulnerability Exploited to Hack Hundreds of Clusters

Ray AI Framework Vulnerability Exploited to Hack Hundreds of Clusters 2024-03-27 at 15:01 By Ionut Arghire Disputed Ray AI framework vulnerability exploited to steal information and deploy cryptominers on hundreds of clusters. The post Ray AI Framework Vulnerability Exploited to Hack Hundreds of Clusters appeared first on SecurityWeek. This article is an excerpt from SecurityWeek

React to this headline:

Loading spinner

Ray AI Framework Vulnerability Exploited to Hack Hundreds of Clusters Read More »

Researchers Discover 40,000-Strong EOL Router, IoT Botnet 

Researchers Discover 40,000-Strong EOL Router, IoT Botnet  2024-03-26 at 20:46 By Ryan Naraine Malware hunters sound an alarm after discovering a 40,000-strong botnet packed with end-of-life routers and IoT devices being used in cybercriminal activities. The post Researchers Discover 40,000-Strong EOL Router, IoT Botnet  appeared first on SecurityWeek. This article is an excerpt from SecurityWeek

React to this headline:

Loading spinner

Researchers Discover 40,000-Strong EOL Router, IoT Botnet  Read More »

Suspicious NuGet Package Harvesting Information From Industrial Systems

Suspicious NuGet Package Harvesting Information From Industrial Systems 2024-03-26 at 17:01 By Ionut Arghire A suspicious NuGet package likely targets developers working with technology from Chinese firm Bozhon. The post Suspicious NuGet Package Harvesting Information From Industrial Systems appeared first on SecurityWeek. This article is an excerpt from SecurityWeek RSS Feed View Original Source React

React to this headline:

Loading spinner

Suspicious NuGet Package Harvesting Information From Industrial Systems Read More »

Over 100 Organizations Targeted in Recent ‘StrelaStealer’ Attacks

Over 100 Organizations Targeted in Recent ‘StrelaStealer’ Attacks 2024-03-25 at 16:16 By Ionut Arghire More than 100 organizations in the US and EU have been targeted in recent StrelaStealer infostealer campaigns. The post Over 100 Organizations Targeted in Recent ‘StrelaStealer’ Attacks appeared first on SecurityWeek. This article is an excerpt from SecurityWeek RSS Feed View

React to this headline:

Loading spinner

Over 100 Organizations Targeted in Recent ‘StrelaStealer’ Attacks Read More »

Top Python Developers Hacked in Sophisticated Supply Chain Attack

Top Python Developers Hacked in Sophisticated Supply Chain Attack 2024-03-25 at 14:01 By Ionut Arghire Multiple Python developers get infected after downloading malware-packed clone of the popular tool Colorama. The post Top Python Developers Hacked in Sophisticated Supply Chain Attack appeared first on SecurityWeek. This article is an excerpt from SecurityWeek RSS Feed View Original

React to this headline:

Loading spinner

Top Python Developers Hacked in Sophisticated Supply Chain Attack Read More »

39,000 Websites Infected in ‘Sign1’ Malware Campaign

39,000 Websites Infected in ‘Sign1’ Malware Campaign 2024-03-22 at 16:01 By Ionut Arghire Over 39,000 websites have been infected with the Sign1 malware that redirects visitors to scam domains. The post 39,000 Websites Infected in ‘Sign1’ Malware Campaign appeared first on SecurityWeek. This article is an excerpt from SecurityWeek RSS Feed View Original Source React

React to this headline:

Loading spinner

39,000 Websites Infected in ‘Sign1’ Malware Campaign Read More »

Recent TeamCity Vulnerability Exploited in Ransomware Attacks

Recent TeamCity Vulnerability Exploited in Ransomware Attacks 2024-03-11 at 17:46 By Eduard Kovacs Servers impacted by recently patched TeamCity vulnerability CVE-2024-27198 targeted in ransomware attacks and abused for DDoS. The post Recent TeamCity Vulnerability Exploited in Ransomware Attacks appeared first on SecurityWeek. This article is an excerpt from SecurityWeek RSS Feed View Original Source React

React to this headline:

Loading spinner

Recent TeamCity Vulnerability Exploited in Ransomware Attacks Read More »

Magnet Goblin Delivers Linux Malware Using One-Day Vulnerabilities

Magnet Goblin Delivers Linux Malware Using One-Day Vulnerabilities 2024-03-11 at 14:14 By Ionut Arghire The financially motivated threat actor Magnet Goblin is targeting one-day vulnerabilities to deploy Nerbian malware on Linux systems. The post Magnet Goblin Delivers Linux Malware Using One-Day Vulnerabilities appeared first on SecurityWeek. This article is an excerpt from SecurityWeek RSS Feed

React to this headline:

Loading spinner

Magnet Goblin Delivers Linux Malware Using One-Day Vulnerabilities Read More »

Microsoft Says Russian Gov Hackers Stole Source Code After Spying on Executive Emails

Microsoft Says Russian Gov Hackers Stole Source Code After Spying on Executive Emails 2024-03-08 at 21:34 By Ryan Naraine Microsoft says the Midnight Blizzard APT group may still be poking around its internal network after stealing source code, spying on emails. The post Microsoft Says Russian Gov Hackers Stole Source Code After Spying on Executive

React to this headline:

Loading spinner

Microsoft Says Russian Gov Hackers Stole Source Code After Spying on Executive Emails Read More »

Scroll to Top