Search results for: Sample
━ popular
Uncategorized
Hackers Using Weaponized Invoice to Deliver LUMMA Malware
Hackers use weaponized invoices to exploit trust in financial transactions, embedding malware or malicious links within seemingly legitimate payment requests. This tactic aims to deceive...
cryptocurrency
US-Seized Crypto Currency Mixer Used by North Korean Lazarus Hackers
The U.S. Treasury Department sanctioned the famous cryptocurrency mixer Sinbad after it was claimed that the North Korean hacker group Lazarus was using it to...
Cyber Security News
CISA Warns Hackers Exploiting Wastewater Systems Logic Controllers
In a disconcerting turn of events, cyber threat actors have set their sights on Unitronics programmable logic controllers (PLCs) embedded in Water and Wastewater...
CVE/vulnerability
Zyxel Command Injection Flaws Let Attackers Run OS Commands
Three Command injection vulnerabilities have been discovered in Zyxel NAS (Network Attached Storage) products, which could allow a threat actor to execute system commands...
Cyber Security News
North Korean Hackers Attacking macOS Using Weaponized Documents
Hackers often use weaponized documents to exploit vulnerabilities in software, which enables the execution of malicious code.All these documents contain malicious code or macros,...