computer security

CISA Opens Its Internal Malware Analysis Tool for Public Use

The Cybersecurity and Infrastructure Security Agency (CISA) has unveiled its latest initiative: opening its advanced malware analysis system, Malware Next-Gen,…

12 months ago

Client-Side Exploitation: Poisoning WebDAV+URL+LNK to Deliver Malicious Payloads

WebDAV incidents simulate an offensive attack employing a WebDAV server to distribute malware to a client PC. Attackers store malicious…

12 months ago

Cyber Espionage: Turla APT Hackers Attack European Organization With Backdoor

Cybersecurity experts have uncovered a failed attempt by the notorious Russia-based Turla Advanced Persistent Threat (APT) group to infiltrate an…

12 months ago

Alert! Brute-Force SSH Attacks Rampant in the Wild: New Study From 427 Million Failed SSH Login Attempts

A comprehensive four-year study of brute-force attacks against SSH servers has revealed an alarming increase in the frequency and sophistication…

12 months ago

New SharePoint Technique Lets Hackers Bypass Security Measures

Two new techniques uncovered in SharePoint enable malicious actors to bypass traditional security measures and exfiltrate sensitive data without triggering…

12 months ago

Chinese Hackers Using AI Tools To Influence Upcoming Elections

By exploiting the AI tools deepfake hackers could make videos or audios of political candidates to spread misinformation or disinformation,…

1 year ago

CoralRaider Hackers Steals Login Credentials, Financial Data & Social Media Logins

A new threat actor dubbed "CoralRaider" targets victims' financial information, login credentials, and social media profiles—including accounts for businesses and…

1 year ago

YubiKey Manager Privilege Escalation Let Attacker Perform Admin Functions

YubiKey Manager GUI on Windows before version 1.2.6 has a vulnerability that could allow an attacker to escalate privileges. Due…

1 year ago

Winnti Hackers’ New UNAPIMON Tool Hijacks DLL And Unhook API Calls

Hackers commonly employ dynamic-link library (DLL) hijacking and unhooking of APIs to damage security measures and authorize harmful activities on…

1 year ago

Researchers Observed Visual Studio Code Extensions Stealing Users’ Sensitive Data

ReversingLabs has uncovered a series of Visual Studio Code (VS Code) extensions designed to transfer sensitive information from unsuspecting users.…

1 year ago