Russian Hackers Use ‘WINELOADER’ Malware to Target German Political Parties

The WINELOADER backdoor used in recent cyber attacks targeting diplomatic entities with wine-tasting phishing lures has been attributed as the handiwork of a hacking...

Russian Hacker Group ToddyCat Uses Advanced Tools for Industrial-Scale Data Theft

The threat actor known as ToddyCat has been observed using a wide range of tools to retain access to compromised environments and steal valuable...

WinZip trial popup vulnerability lets hackers drop malware

The worker customer correspondence in specific renditions of the WinZip document pressure apparatus is uncertain and could be altered to serve malware or fake...

Foxconn suffers a Ransomware attack; $34 million Ransom demanded

Foxconn endured a ransomware assault at its Mexican office over the Thanksgiving weekend, by DoppelPaymer ransomware pack. Foxconn is the biggest hardware producing organization, with...

TeamCity Flaw Leads to Surge in Ransomware, Cryptomining, and RAT Attacks

Multiple threat actors are exploiting the recently disclosed security flaws in JetBrains TeamCity software to deploy ransomware, cryptocurrency miners, Cobalt Strike beacons, and a...

Google Maps Timeline Data to be Stored Locally on Your Device for Privacy

Google has announced plans to store Maps Timeline data locally on users' devices instead of their Google account effective December 1, 2024.The changes were...

Critical Update: CrushFTP Zero-Day Flaw Exploited in Targeted Attacks

Users of the CrushFTP enterprise file transfer software are being urged to update to the latest version following the discovery of a security flaw...

Microsoft Warns of Hackers Exploiting OAuth for Cryptocurrency Mining and Phishing

Microsoft has warned that adversaries are using OAuth applications as an automation tool to deploy virtual machines (VMs) for cryptocurrency mining and launch phishing...

‘Largest illegal darknet marketplace’ DarkMarket taken offline

A Europol-composed worldwide examination has cut down Darkmarket, the biggest working illicit commercial center in the Dark Web before the takedown. The move saw...

New NKAbuse Malware Exploits NKN Blockchain Tech for DDoS Attacks

A novel multi-platform threat called NKAbuse has been discovered using a decentralized, peer-to-peer network connectivity protocol known as NKN (short for New Kind of...

Follow Us Here!

372FansLike
332FollowersFollow
323FollowersFollow

Popular Posts