Friday, January 31, 2025

Security Hacker

Hackers Compromised Bangladesh Embassy Website that Drops Weaponized Word Document with Malware

Threat actors compromised the Bangladesh embassy in Cairo website and taking control to drops the weaponized word documents that contains privilege escalation flaw exploit...

Hackers Launching New Muncy Malware as .EXE File Worldwide via DHL Phishing Campaign

Cyber Criminals now distributing new dubbed Muncy malware as a EXE file format via DHL phishing campaigns to target the users around...

500px Hacked – Attackers Stolen 14.8 Million Users Personal Data

500px , an online photography community suffering a massive data breach that leaked 14.8 million users personal information by cybercriminals.500px global network for...

620 Million Online Accounts Data Stolen from 16 Hacked websites – Available in Dark Web for Sale

A new shocking report revealed that almost 620 million online account data from 20 famous websites currently hackers selling it in dark web for...

New Unpatched macOS Flaw Allow Hackers to Spy on Safari Browser History

Security Researcher discovered a vulnerability in macOS Mojave let malware apps bypass the privacy protection and read the safari browser web history.macOS Mojave...

Hackers Find New Ways to Use .EXE File Against macOS to Launch Malware that Bypass Protection & Steal Data

Yes, What you hear is something mysterious that the .EXE file runs on macOS is totally new right. but this strange activity uncovered by...

Hackers Launching Ursnif Malware via Weaponized office Document Using Steganography Technique

Cyber Criminals now distributing powerful ursnif malware via malicious Office Documents with multi-stage highly obfuscated PowerShell scripts to bypass security controls.ursnif is a banking...

Hackers Launching Powerful Malware ExileRAT Via Weaponized Microsoft PowerPoint Document

Researchers observed a new malicious campaign that delivers a powerful ExileRAT malware via Microsoft powerpoint documents using previously used C2 server infrastructure.Attackers deliver the...