Search Results: Sample
Hackers Steal User’s Database From European Telecommunications Standards Institute
The European Telecommunications Standards Institute (ETSI) has uncovered a data breach in which threat actors obtained a database holding a list of portal users.The...
Zip Slip Vulnerability Let Attacker Import Malicious Code and Execute Arbitrary Code
A critical Zip Slip vulnerability was discovered in the open-source data cleaning and transformation tool ‘OpenRefine’, which allowed attackers to import malicious code and execute arbitrary...
LightSpy APT Attacking WeChat Users to Steal Payment Data
LightSpy malware, responsible for a watering hole attack conducted against iOS users in Hong Kong, has been discovered to be embedded with Android implant...
Lazarus Tricking Employees with Trojanized Coding Challenges
Lazarus group has been recently discovered to have targeted an Aerospace company in Spain, which involved deploying several tools, including an undocumented backdoor named...
Hackers Bypass Cloudflare Firewall and DDoS Protections using Cloudflare
Cloudflare, a prominent cybersecurity vendor renowned for its web protection services, faces a security challenge that could expose its customers to unforeseen risks. A recent...
MadPot: AWS Honeypot to Disrupt Threat Actors
In the realm of cybersecurity, the battle against threat actors never stops. With its vast cloud infrastructure, Amazon Web Services (AWS) is at the...
APT34 Employs Weaponized Word Documents to Deploy New Malware Strain
APT34 is a secretive cyberespionage group specializing in Middle East targets, known for gathering sensitive intelligence via spear phishing and advanced infiltration methods.The sophistication...
Budworm APT Attacking Telecoms Org With New Custom Tools
APT (Advanced Persistent Threat) actors are evolving at a rapid pace, continually enhancing their toolsets and tactics. They adapt quickly to security measures, leveraging advanced...