Friday, March 29, 2024

AgentTesla Stealer Delivered Via Weaponized PDF and CHM Files

0
AgentTesla, a notorious information stealer, is observed spreading via CHM and PDF Files, which covertly harvest critical information from the victim's computer.The stealer has...

Building a Network Security Strategy: Complete Checklist To Protect Your Network

0
Whether you’re a large or small business, network security is something you can’t ignore.Threat actors can and will, infiltrate businesses of any size wreaking...

Hackers Steal User’s Database From European Telecommunications Standards Institute

0
The European Telecommunications Standards Institute (ETSI) has uncovered a data breach in which threat actors obtained a database holding a list of portal users.The...

Promptmap – Tool to Test Prompt Injection Attacks on ChatGPT Instances

0
Prompt injection refers to a technique where users input specific prompts or instructions to influence the responses generated by a language model like ChatGPT.However,...

DUCKTAIL Malware Employs LinkedIn Messages to Execute Attacks

0
LinkedIn messages were used as a way to launch identity theft attacks in a malicious campaign that Cluster25 detected. They send messages from hacked accounts...

Octo Tempest Attacking Organizations to Steal Financial Data

0
Microsoft has been closely monitoring the Octo Tempest, a significant financial threat organization. This threat group employs various strategies and TTPs for worldwide extortion, making...

Hackers Switching from Weaponized Office Documents to CHM & LNK Files

0
Malware distribution methods have changed significantly in the cyber threat landscape. Data analysis shows that Microsoft Office document files are no longer the preferred...

ServiceNow Misconfigurations Lead to Leak of Sensitive Data

0
ServiceNow has been alerted to a potential misconfiguration concern that might impact the security of its platform. The company is actively addressing the issue...
D-LINK SQL Injection Vulnerability

D-LINK SQL Injection Vulnerability Let Attacker Gain Admin Privileges

0
A security flaw called SQL injection has been uncovered in the D-Link DAR-7000 device.SQL injection is a malicious attack that exploits vulnerabilities in web...

Threat Actors Abusing 404 Pages to Hide Credit Card Stealing Malware

0
A new web skimming campaign has been discovered, which targets multiple organizations in the food and retail industries. This campaign was unique as it...

Managed WAF protection

Website

Recent Articles