Category: Information Security

AgentTesla malware

Fileless Attack: AgentTesla Strikes with .NET Injection

In a recent campaign involving the dissemination of the AgentTesla malware, as meticulously analyzed by experts at SonicWall, perpetrators employed VBA macros in Word documents to conduct a fileless injection attack, where the malicious...

PlugX worm

2.5 Million Infected: PlugX Malware Network Revealed

Researchers from Sekoia have revealed alarming details about the malicious worm PlugX, which, having been abandoned by its creators many years ago, continues to autonomously spread and infect millions of computers worldwide. PlugX, believed...

CVE-2024-4040

1,400+ CrushFTP Servers at Risk: Update Now!

Over 1,400 internet-accessible CrushFTP servers are vulnerable to attacks exploiting the critical server vulnerability CVE-2024-4040. This flaw, whose active exploitation was previously reported at the beginning of the week, allows unauthorized attackers to access...

Brokewell

Fake Chrome Update Hides Android Brokewell Spyware

ThreatFabric has identified a new malicious application named Brokewell, capable of recording every action on a device, from keystrokes to text input and application launches. The Trojan is distributed through a counterfeit Google Chrome...

CVE-2024-20353

Cisco Zero-Days Exploited in State-Sponsored Breach

Network security measures such as firewalls are designed to safeguard corporate networks from breaches. However, it turns out that cybercriminals are increasingly turning these systems against their owners, using them as springboards to infiltrate...

CVE-2024-2389

Critical Alert: Flowmon Exploit Puts 1,500+ Firms at Risk

Security experts have identified a critical vulnerability in the Flowmon network performance monitoring tool from Progress Software, utilized by over 1,500 companies globally, including major organizations such as SEGA, KIA, and Volkswagen. The vulnerability...

keyboard vulnerabilities

Millions at Risk: Popular Keyboard Apps Leak Keystrokes (

Experts at Citizen Lab have identified vulnerabilities in popular keyboard applications that could be exploited to log keystrokes of Chinese users worldwide. These security issues are nearly ubiquitous across apps, including those pre-installed on...

Nespresso Phishing Attack

Phishing Attack Lurks in Nespresso Domain

Cybersecurity researchers from Perception Point recently discovered a vulnerability on the Nespresso coffee machine and capsule manufacturer’s website, which scammers actively exploit to redirect users to malicious sites. The vulnerability, related to open redirection,...

Dependency Confusion Vulnerability

Dependency Confusion Flaw Found in Old Apache Code

Recently, security researchers identified a new vulnerability known as Dependency Confusion, affecting an archived Apache project titled Cordova App Harness. This vulnerability enables malefactors to manipulate package managers into downloading a fraudulent package from...

GuptiMiner

eScan Update Delivers Backdoors & Cryptominers

North Korean hackers exploited the eScan antivirus update mechanism to embed backdoors into corporate networks and disseminate cryptocurrency miners using the malicious software, GuptiMiner. Cybersecurity firm Avast reports that the perpetrators conducted an adversary-in-the-middle...

Lazarus Group

North Korea Targets S.Korean Defense Tech

The South Korean police have issued a warning about cyberattacks by North Korean hacker groups targeting defense industry enterprises to steal valuable technological information. The police have documented several instances of successful breaches of...