Researchers at Kaspersky discovered cyber-espionage activity that used the vulnerability in a one-click phishing attack to deliver malware. The original article found on darkreading Read […]
Category: Cyber Security News
‘Lucid’ Phishing-as-a-Service Exploits Faults in iMessage, Android RCS
Cybercriminals in China have figured out how to undermine the strengths of mobile messaging protocols. The original article found on darkreading Read More
EncryptHub Exploits Windows Zero-Day to Deploy Rhadamanthys and StealC Malware
The threat actor known as EncryptHub exploited a recently-patched security vulnerability in Microsoft Windows as a zero-day to deliver a wide range of malware families, […]
RedCurl Shifts from Espionage to Ransomware with First-Ever QWCrypt Deployment
The Russian-speaking hacking group called RedCurl has been linked to a ransomware campaign for the first time, marking a departure in the threat actor’s tradecraft. […]
New Testing Framework Helps Evaluate Sandboxes
The Anti-Malware Testing Standards Organization published a Sandbox Evaluation Framework to set a standard among various sandbox offerings that help protect organizations from rising threats. […]
200 Unique Domains Used by Raspberry Robin Unveiled
Raspberry Robin, a complex and evolving malware threat, has been operating since 2019, initially spreading through infected USB drives at print and copy shops. This […]
Clevo Devices Boot Guard Private Key Exposed Via Firmware Update Packages
Researchers have discovered a major security vulnerability affecting multiple gaming laptop models using Clevo hardware. Boot Guard private keys were found exposed within firmware update […]
Malicious npm Package Modifies Local ‘ethers’ Library to Launch Reverse Shell Attacks
Cybersecurity researchers have discovered two malicious packages on the npm registry that are designed to infect another locally installed package, underscoring the continued evolution of […]
Sparring in the Cyber Ring: Using Automated Pentesting to Build Resilience
“A boxer derives the greatest advantage from his sparring partner…” — Epictetus, 50–135 AD Hands up. Chin tucked. Knees bent. The bell rings, and both […]
DrayTek Routers Vulnerability Exploited in the Wild – Possibly Links to Reboot Loop
Multiple internet service providers worldwide are reporting widespread disruptions as DrayTek routers enter continuous reboot loops, affecting businesses and consumers alike. Security intelligence firm GreyNoise […]