Category: Information Security
Brazilian banking institutions have become the target of a new campaign disseminating a specialized variant of the AllaKore remote access trojan (RAT) for Windows, named AllaSenha. This RAT is designed to steal credentials necessary...
Check Point has reported that since late April, cybercriminals have been actively exploiting a critical vulnerability in the Check Point VPN remote access system, allowing them to steal Active Directory data for further infiltration...
Recently, Netflix reported that since the launch of its Bug Bounty program in 2016, the streaming giant has paid researchers over one million dollars in rewards for identifying bugs and vulnerabilities in the company’s...
A relatively new North Korean cyber group known as Moonstone Sleet has recently been identified as responsible for attacks on the software, information technology, education, and defense industries, utilizing ransomware and other types of...
Specialists at Zscaler have identified over 90 malicious applications on Google Play, designed to distribute malware and adware, including the banking trojan Anatsa. These applications have been downloaded more than 5.5 million times. Description...
The U.S. Department of the Treasury has imposed sanctions on a cybercriminal network involving three Chinese nationals and three companies from Thailand. These entities are connected to a major botnet that controls a residential...
A recent leak of thousands of pages of internal Google documents has revealed the true workings of the company’s search algorithm. These documents, which have come into the hands of SEO experts, raise questions...
Check Point, a cybersecurity firm, has urged its clients to review their VPN configurations to prevent potential attacks from malicious actors attempting to access corporate networks. In its May 28th notification, the company highlighted...
A new privilege escalation vulnerability has been discovered in macOS 14 Sonoma, designated as CVE-2024-27842. While the severity of this vulnerability has not yet been determined, it affects all versions of macOS 14.x up...
Scientists have unveiled the details of a powerful and efficient new technique called the “pulsing denial-of-service” (PDoS) attack, which leverages DNS queries and responses to achieve an attack amplification factor of 20,000 times. The...
Over the past three months, hackers behind the CatDDoS botnet have exploited over 80 known vulnerabilities in various software products to infect devices and incorporate them into their network for conducting Distributed Denial-of-Service (DDoS)...
Fraud on classifieds and marketplaces has become a serious issue due to the emergence of organized criminal groups operating under a “Fraud-as-a-Service” model. These groups continuously refine their methods to steal money and personal...
According to a report by Sucuri, unknown hackers are exploiting obscure WordPress plugins to inject malicious PHP code into victim sites and steal payment data. On May 11, Sucuri specialists discovered a campaign in...
Check Point has reported that cybercriminals are targeting Check Point Remote Access VPN devices as part of an ongoing campaign to breach corporate networks. Remote access is integrated into all Check Point network firewalls....
A serious vulnerability has been identified in the TP-Link Archer C5400X gaming router, leading to remote code execution on vulnerable devices through specially crafted requests. The vulnerability, designated CVE-2024-5035, has received the highest possible...
A hacker breached the website of the spyware application pcTattletale, which was found to be installed on registration systems of several Wyndham hotel chain locations in the United States. The attacker posted offensive content...