Cactus Ransomware Exploiting Qlik Sense code execution Vulnerability
A new Cactus Ransomware was exploited in the code execution vulnerability to Qlik Sense for initial access.Qlik Sense is a data discovery and analytics...
Hackers Bypass Antivirus with ScrubCrypt Tool to Install RedLine Malware
The ScrubCrypt obfuscation tool has been discovered to be utilized in attacks to disseminate the RedLine Stealer malware, and its new variant was being marketed in underground communities.Threat actors use...
Hotel’s Booking.com Hacked Logins Let Attacker Steal Guest Credit Cards
According to a recent report by Secureworks, a well-planned and advanced phishing attack was carried out, specifically targeting hotels and their guests, through the...
Critical Zoom Vulnerability Let Attackers Take Over Meetings
Zoom, the most widely used video conferencing platform has been discovered with a critical vulnerability that threat actors could potentially exploit for various malicious...
Hackers Using Weaponized Invoice to Deliver LUMMA Malware
Hackers use weaponized invoices to exploit trust in financial transactions, embedding malware or malicious links within seemingly legitimate payment requests. This tactic aims to deceive...
US-Seized Crypto Currency Mixer Used by North Korean Lazarus Hackers
The U.S. Treasury Department sanctioned the famous cryptocurrency mixer Sinbad after it was claimed that the North Korean hacker group Lazarus was using it to...
CISA Warns Hackers Exploiting Wastewater Systems Logic Controllers
In a disconcerting turn of events, cyber threat actors have set their sights on Unitronics programmable logic controllers (PLCs) embedded in Water and Wastewater...
Zyxel Command Injection Flaws Let Attackers Run OS Commands
Three Command injection vulnerabilities have been discovered in Zyxel NAS (Network Attached Storage) products, which could allow a threat actor to execute system commands...