The Cisco Talos research team uncovered a vast espionage campaign targeted at a non-profit charitable organization in Saudi Arabia. Commencing in March 2021, the campaign employed a previously unknown custom backdoor named Zardoor, which...
In the latest Patch Tuesday update released by Microsoft in February 2024, a total of 73 vulnerabilities in the company’s software were addressed, including two zero-day vulnerabilities that were actively being exploited by malefactors,...
A 17-year-old researcher discovered that through the Juniper customer support portal, information about devices and support contracts for numerous clients could be accessed. The data leak has been ongoing since September 2023. Esteemed cybersecurity...
Experts at Zscaler ThreatLabz have identified significant modifications in the functionality of the malicious software PikaBot. The new version, labeled 1.18.32, is currently undergoing a development and testing phase, during which the developers have...
In November 2023, the Indian conglomerate Infosys, a global titan in software provision, precipitated a widespread data breach that implicated Bank of America’s clientele. An official statement released on November 3rd revealed that the...
Cybersecurity specialists have identified a vulnerability in the implementation of the Rhysida ransomware, which allowed the decryption keys to be recovered and the data locked by the malware to be decrypted. This discovery was...
Hackers are exploiting a Server-Side Request Forgery (SSRF) vulnerability in Ivanti Connect Secure (ICS), Policy Secure (IPS), and ZTA products to deploy a new backdoor named DSLog on vulnerable devices. The flaw, identified as...
In Romania, a minimum of 25 hospitals have faced severe operational challenges due to a vast ransomware assault, which has debilitated the local healthcare management system. The Hipocrate Information System (HIS), employed by Romanian...
According to the latest reports by journalists from TechCrunch, a spyware application for Android named TheTruthSpy, openly available for download, is riddled with vulnerabilities. This flaw exposes data from tens of thousands of devices...
The United States Department of Justice has announced the seizure of online infrastructure utilized for the sale of a Remote Access Trojan (RAT) named Warzone RAT, including the confiscation of four domains, one of...
According to a joint warning issued on February 7th by the United States Cybersecurity and Infrastructure Security Agency (CISA), the National Security Agency (NSA), and the Federal Bureau of Investigation (FBI), the Chinese hacking...
Cybersecurity experts at Check Point have unearthed yet another variant of the Raspberry Robin worm, initially identified in 2021. This trojan is distinguished by its high degree of adaptability and the sophistication of its...
CrowdStrike has unveiled that the architects behind the HijackLoader loader have integrated novel evasion tactics, as this malicious software increasingly becomes a tool of choice for cybercriminals to deploy additional payloads and tools. The...
Cybersecurity experts at McAfee have discovered a new iteration of the malicious XLoader software, capable of autonomously initiating on infected Android smartphones upon installation. This revelation poses a significant threat to users across the...
Specialists at Kaspersky Lab have uncovered the Coyote banking trojan, targeting users of over 60 financial institutions, predominantly in Brazil. This malware distinguishes itself through a complex infection chain that employs various advanced technologies,...
Amidst Apple’s positioning of its App Store as a bastion of security and reliability, the company encountered a formidable threat to its reputation: a fraudulent application, masquerading as LastPass, found its way into the...