In March 2024, cybercriminals launched an attack on dozens of organizations in Germany using a PowerShell script, presumably developed with the aid of artificial intelligence. The campaign involved the distribution of the infostealer Rhadamanthys....
In a recent series of cyberattacks, an unidentified group of hackers infiltrated the systems of two key Israeli ministries—the Ministry of Defense and the Ministry of Justice—raising alarms at the highest levels of national...
Researchers have uncovered a new large-scale attack utilizing the malicious Raspberry Robin software. Since March 2024, cybercriminals have actively been distributing it through modified Windows Script Files (WSF). As noted by HP Wolf Security...
Cybersecurity specialists have uncovered a sophisticated multi-stage attack employing phishing messages themed around invoices to disseminate various types of malicious software, including Venom RAT, Remcos RAT, XWorm, NanoCore RAT, and different info stealers targeting...
Researchers at the University of Amsterdam have uncovered a novel attack methodology, Native BHI, that enables hackers to access data stored in the Linux kernel’s memory on computers equipped with Intel processors. This method...
Recently, researchers at Malwarebytes have observed an ongoing wave of cyber attacks targeted at system administrators via fraudulent advertisements for PuTTY and FileZilla utilities. These advertisements appear as sponsored results in the Google search...
A vulnerability has been discovered within the standard library of the Rust programming language, allowing for the execution of malicious code on Windows systems. CVE-2024-24576, rated with a CVSS score of 10, stems from...
A cybercriminal group from Romania, known under the codename “RUBYCARP,” is exploiting known vulnerabilities and brute force methods to breach corporate networks and servers for financial gain, according to a recent report by Sysdig....
Researchers from Bitdefender have identified four vulnerabilities in several versions of WebOS, the operating system utilized in LG smart TVs. These flaws enable cybercriminals to gain unauthorized access and control over the devices at...
CVS Group, the proprietor of one of the largest networks of veterinary clinics in the United Kingdom, has reported a grave “cyber incident” that has significantly disrupted operations across its national branches. The incident...
The MalwareHunterTeam has reported that nearly 2,000 compromised WordPress sites are being used to display fraudulent pop-up ads offering NFT deals and cryptocurrency discounts. This campaign aims to deceitfully prompt visitors to connect their...
Experts at Palo Alto Networks have discovered that cybercriminals are increasingly resorting to so-called “scanning attacks,” initiated by malicious software, to detect vulnerabilities within target networks. Intriguingly, a significant majority of such attacks originate...
According to Trustwave SpiderLabs, Latin America has been hit by a new phishing campaign that infects Windows systems through emails. The attack begins with the distribution of emails containing a ZIP file attachment. Upon...
According to Wccftech, Google unveiled its inaugural in-house developed chip based on the Arm architecture, officially named Axion, at the 2024 Cloud Next conference. This chip, specifically designed for data centers, is touted by...
Over 16,500 Ivanti Connect Secure and Policy Secure gateways accessible via the Internet are at risk due to a high-severity vulnerability that enables remote code execution (RCE) and denial of service (DoS) attacks. The...
Cybersecurity experts are alerting to a new wave of attacks targeting Portuguese-speaking countries using fake Adobe Reader installers to disseminate a multifunctional malware known as Byakugan. The attack commences with a PDF file that,...