Imagine this: Your organization completed its annual penetration test in January, earning high marks for security compliance. In February, your development team deployed a routine […]
Author: cyberbytes
Malicious npm Package Leverages Unicode Steganography, Google Calendar as C2 Dropper
Cybersecurity researchers have discovered a malicious package named “os-info-checker-es6” that disguises itself as an operating system information utility to stealthily drop a next-stage payload onto […]
Russia-Linked APT28 Exploited MDaemon Zero-Day to Hack Government Webmail Servers
A Russia-linked threat actor has been attributed to a cyber espionage operation targeting webmail servers such as Roundcube, Horde, MDaemon, and Zimbra via cross-site scripting […]
Hacker nehmen Rüstungslieferanten der Ukraine ins Visier
Russische Hacker greifen gezielt Rüstungsfirmen an, die die Ukraine mit Waffen versorgen. PeopleImages.com – Yuri A – Shutterstock.com Die berüchtigte russische Hackergruppe Fancy Bear hat […]
‘Aggressive, creative’ hackers behind UK breaches now eyeing US retailers
Google has warned that a hacking group linked to “Scattered Spider,” which is believed to be behind the attack on UK retailer Marks & Spencer […]
The most effective phishing QR code is a new drug and alcohol policy supposedly from HR
Phishing emails that appear to be internal and come from the IT or HR department are the emails that trick the most users, according to […]
5 BCDR Essentials for Effective Ransomware Defense
Ransomware has evolved into a deceptive, highly coordinated and dangerously sophisticated threat capable of crippling organizations of any size. Cybercriminals now exploit even legitimate IT […]
How phones get hacked: 7 common attack methods explained
The smartphone revolution was supposed to provide a second chance for the tech industry to roll out a secure computing platform. These new devices were […]
Critical BitLocker Flaw Exploited in Minutes: Bitpixie Vulnerability Proof of Concept Unveiled
Security researchers have demonstrated a non-invasive method to bypass Microsoft BitLocker encryption on Windows devices in just five minutes without physically modifying the hardware. The […]
New Chrome Vulnerability Enables Cross-Origin Data Leak via Loader Referrer Policy
Google on Wednesday released updates to address four security issues in its Chrome web browser, including one for which it said there exists an exploit […]