Cyber Attack
HORUS Protector Delivering AgentTesla, Remcos, Snake, NjRat Malware
The Horus Protector crypter is being used to distribute various malware families, including AgentTesla, Remcos, Snake, NjRat, and others, whose primarily spread through archive files containing VBE scripts, which...
Android
ErrorFather Hackers Attacking & Control Android Device Remotely
The Cerberus Android banking trojan, which gained notoriety in 2019 for its ability to target financial and social media apps, has continued to evolve...
Cisco
Hackers Allegedly Selling Data Stolen from Cisco
A group of hackers reportedly sells sensitive data stolen from Cisco Systems, Inc.The breach, allegedly carried out by a collective known as IntelBroker...
CVE/vulnerability
Fortigate SSLVPN Vulnerability Exploited in the Wild
A critical vulnerability in Fortinet's FortiGate SSLVPN appliances, CVE-2024-23113, has been actively exploited in the wild.This format string flaw vulnerability has raised significant...
CVE/vulnerability
Splunk Enterprise Vulnerabilities let Attackers Execute Remote Code
Splunk has disclosed multiple vulnerabilities affecting its Enterprise product, which could allow attackers to execute remote code.These vulnerabilities, primarily affecting Windows installations, highlight...
CVE/vulnerability
OilRig Hackers Exploiting Microsoft Exchange Server To Steal Login Details
Earth Simnavaz, an Iranian state-sponsored cyber espionage group, has recently intensified its attacks on critical infrastructure in the UAE and wider Gulf region. The group...
Cyber Attack
CoreWarrior Malware Attacking Windows Machines From Dozens Of IP Address
Researchers recently analyzed a CoreWarrior malware sample, which spreads aggressively by creating numerous copies and connecting to various IP addresses.It establishes multiple backdoor connections...
Android
TrickMo Malware Targets Android Devices to Steal Unlock Patterns and PINs
The recent discovery of the TrickMo Banking Trojan variant by Cleafy has prompted further investigation, where researchers have identified 40 variants, 16 droppers, and...
CVE/vulnerability
pac4j Java Framework Vulnerable to RCE Attacks
A critical security vulnerability has been discovered in the popular Java framework pac4j. The vulnerability specifically affects versions before 4.0 of the pac4j-core module....
Cyber Security News
Beware of Fake AI Scam calls that Takeover your Gmail Account
Scammers use sophisticated AI technology to impersonate tech giants like Google, aiming to take over unsuspecting users' Gmail accounts.A recent incident highlights these...
Cyber Security News
Zendesk Email Spoofing Flaw Let Attackers Access Support Tickets
A security vulnerability in Zendesk, a widely used customer service tool, has been uncovered. This flaw allowed attackers to access support tickets from any...