Wednesday, January 22, 2025

cyber security

.NET-based Snake Keylogger Attack Windows Using Weaponized Excel Documents

Researchers uncovered a sophisticated phishing campaign that exploits a .NET-based Snake Keylogger variant.This attack leverages weaponized Excel documents to infiltrate Windows systems, posing...

Attackers Spread Lumma Stealer Malware GitHub Comments

Cybercriminals are leveraging platforms like GitHub to spread the Lumma information stealer malware.This sophisticated threat is part of a growing trend where attackers use...

Hackers Exploited Digital Advertising Tools to Launch Malicious Campaigns

Cybersecurity researchers from Mandiant and Google Cloud have uncovered a sophisticated scheme where hackers exploit digital advertising tools to conduct malicious campaigns.These tools, originally...

Hackers Repeatedly Using Same iOS & Chrome Exploits to Attack Government Websites

Hackers have been exploiting vulnerabilities in iOS and Google Chrome to target government websites, particularly in Mongolia.Google's Threat Analysis Group (TAG) observed these...

Check Point to Acquire Cyberint Technologies to Enhance Operations

Check Point® Software Technologies Ltd. (NASDAQ: CHKP), a leading cybersecurity solutions provider, has announced a definitive agreement to acquire Cyberint Technologies Ltd.This acquisition...

Wireshark 4.4.0 Released – What’s New!

The Wireshark Foundation has announced the release of Wireshark 4.4.0, marking a significant update to the popular open-source network protocol analyzer.This latest version...

Critical Vulnerability in Perl Module Installer Let Attackers Intercept Traffic

A critical vulnerability has been identified in App::cpanminus (cpanm), a widely used tool for downloading and installing Perl modules.This vulnerability, CVE-2024-45321, exposes users...

TDECU MOVEit Data Breach, 500,000+ members’ Personal Data Exposed

Texas Dow Employees Credit Union (TDECU) has disclosed that the personal information of over 500,000 members was exposed due to a security compromise involving...