Saturday, June 22, 2024

Hackers Weaponizing Microsoft Access Documents To Execute Malicious Program

0
In multiple aggressive phishing attempts, the financially motivated organization UAC-0006 heavily targeted Ukraine, utilizing ZIP and RAR attachments to distribute SMOKELOADER malware.The most recent...

Turla Hackers Leveraging Microsoft Build Engine To Deliver Malware Stealthily

0
Hackers exploit the Microsoft Build Engine because it can execute code and build applications. This engine provides an easy means for them to send harmful...

Stealerium Malware Targeting Wi-Fi Networks, Outlook to Steal Login Credentials

0
A new strain of malware known as Stealerium has been identified. It targets Wi-Fi networks and Microsoft Outlook to steal login credentials.This sophisticated malware...

Cloud-Based Malware Attack Abusing Google Drive & Dropbox

0
A phishing email with a malicious zip attachment initiates the attack. The zip contains a single executable disguised as an Excel file using Left-To-Right...

DoppelGänger Attack: Malware Routed Via News Websites And Social Media

0
A Russian influence campaign, DoppelGänger, leverages fake news websites (typosquatted and independent) to spread disinformation, undermining support for Ukraine.Structura and SDA are running...
Microsoft Unveild New Windows 11 Features

Microsoft Unveild New Windows 11 Features To Strengthen Security

0
Microsoft has been prioritizing security in Windows, as they introduced Secured-Core PCs to protect from hardware to cloud attacks and expanded passwordless offerings with...
Grandoreiro Malware Outlook Phishing

Grandoreiro Malware Hijacks Outlook Client to Send Phishing Emails

0
X-Force identified a phishing campaign targeting Latin American users since March 2024, where emails impersonate legitimate entities like tax and utility services, urging recipients...

Kinsing Malware Attacking Apache Tomcat Servers To Deploy Cryptominers

0
Kinsing malware, known for exploiting vulnerabilities on Linux cloud servers to deploy backdoors and cryptominers, has recently expanded its target to include Apache Tomcat...

ViperSoftX Malware Uses Deep Learning Model To Execute Commands

0
ViperSoftX malware, known for stealing cryptocurrency information, now leverages Tesseract, an open-source OCR engine, to target infected systems, which extracts text from images, and...

QakBot Malware Exploiting Windows zero-Day To Gain System Privileges

0
In April 2024, security researchers revisited CVE-2023-36033, a Windows DWM Core Library elevation of privilege vulnerability that was previously discovered and exploited in the...

Managed WAF protection

Website

Recent Articles