computer security

New Malicious PyPI Packages Use DLL Sideloading In A Supply Chain Attack

Researchers have discovered that threat actors have been using open-source platforms and codes for several purposes, such as hosting C2…

11 months ago

New Mingo Malware Attacking Linux Redis Servers To Mine Cryptocurrency

The malware, termed Migo by the creators, attempts to infiltrate Redis servers to mine cryptocurrency on the Linux host. The campaign employed…

11 months ago

LockBit Ransomware Members Charged by Authorities, Free Decryptor Released

In a significant blow to one of the most prolific ransomware operations, authorities from the U.S. and U.K., in collaboration…

12 months ago

SolarWinds ARM Flaw Let Attackers Execute Remote Code

SolarWinds has released their Access Rights Manager version 2023.2.3, in which several vulnerabilities associated with Deserialization and Directory Traversal leading…

12 months ago

New TicTacToe Malware Dropper Attacking Windows Users

Malware often targets Windows users due to the operating system's widespread popularity, making it a lucrative target for threat actors. …

12 months ago

Ukrainian Hacker Pleads Guilty for Leading Zeus & IcedID Malware Attacks

Vyacheslav Igorevich Penchukov, a 37-year-old resident of Donetsk, Ukraine, has pleaded guilty to his key role in developing and deploying…

12 months ago

New Outlook 0-day RCE Flaw Exploited in the Wild

Outlook has been discovered to have an interesting vulnerability while handling specific hyperlinks, which was found to be exploited by…

12 months ago

OpenAI Shuts Down Accounts Used to Generate Phishing Emails & Malware

While Artificial Intelligence holds immense potential for good, its power can also attract those with malicious intent.  State-affiliated actors, with…

12 months ago

DNS Server Vulnerability: Single DNS Packet can Bring Down the System

A new flaw has been discovered in DNSSEC, which, when exploited by threat actors, could result in the unavailability of…

12 months ago

How to Analyze the MITRE Engenuity ATT&CK® Evaluations: Enterprise

Thorough, independent tests are vital as cybersecurity leaders and their teams evaluate vendors’ abilities to guard against increasingly sophisticated threats…

12 months ago