Category: CyberSecurityNews

North Korean Hackers Abuse Cloud-Based Services to Deploy Malware
10
Nov
2024

North Korean Hackers Abuse Cloud-Based Services to Deploy Malware

ESET’s recent report details the activities of various advanced persistent threat (APT) groups from April to September 2024, highlighting key…

Beware of Fake Copyright Claims that Deliver Rhadamanthys Stealer Malware
10
Nov
2024

Beware of Fake Copyright Claims that Deliver Rhadamanthys Stealer Malware

Cybercriminals have launched a large-scale phishing attack using a new variant of Rhadamanthys Stealer, dubbed CopyRh(ight)adamantys, which targets individuals and…

Threat Actors Attacking macOS Users With New Multi-stage Malware
10
Nov
2024

Threat Actors Attacking macOS Users with New Multi-Stage Malware

North Korean threat actors, likely associated with BlueNoroff, have launched multi-stage malware attacks targeting cryptocurrency businesses, expanding their toolkit to…

Hackers Can Hijack Your MFA Enabled Email Accounts By Stealing Cookies
08
Nov
2024

Hackers Hijack MFA Enabled

MFA enhances the security of email accounts by requiring users to provide additional verification beyond just their password. Implementing MFA…

Threat Actors Attacking macOS Users With New Multi-stage Malware
08
Nov
2024

Threat Actors Attacking macOS Users With New Multi-stage Malware

Multi-stage malware means sophisticated cyberattack strategies that evolve in several steps. Recent developments in multi-stage malware highlight the increasing sophistication…

Beware of Fake Copyright Claims That Deliver Rhadamanthys Stealer
08
Nov
2024

Beware of Fake Copyright Claims That Deliver Rhadamanthys Stealer

Stealer malware is a type of malicious software designed to infiltrate computers and extract sensitive information. Once installed, it communicates…

ANY.RUN Linux sandbox
07
Nov
2024

ANY.RUN Launched an Upgraded Linux Sandbox for Effective Malware Analysis

October 2024 has been a productive month for Interactive malware analysis platform ANY.RUN, bringing a series of improvements aimed at…

New SteelFox Malware Infected 11,000+ Windows Systems As Software Activators
07
Nov
2024

New SteelFox Malware Infected 11,000+ Windows Systems As Software Activators

Hackers primarily target Windows systems due to their significant market share: Over 80% of desktop operating systems run Windows. Not…

Hackers Use ZIP File Concatenation Tactic to Launch Undetected Attacks on Windows Users
07
Nov
2024

Hackers Employ ZIP File Concatenation Tactic to Attack Windows Users

Cybercriminals are utilizing a sophisticated evasion strategy called ZIP file concatenation to specifically target Windows users. This method combines several…

Cisco Industrial Wireless Software Flaw Let Attackers Run Command As Root User
07
Nov
2024

Cisco Industrial Wireless Software Flaw Let Attackers Run Command As Root User

Hackers target Cisco primarily due to its critical role in global network infrastructure and security. Cisco’s devices are essential for…

Multiple Vulnerabilities in HPE Aruba Access Points Let Attackers Execute Remote Code
07
Nov
2024

Multiple Vulnerabilities in HPE Aruba Access Points Let Attackers Execute Remote Code

Multiple critical vulnerabilities have been identified in HPE Aruba Access Points, potentially allowing attackers to execute remote code and compromise…

Cisco Identity Services Engine Flaw Bypass Authorization Mechanisms
07
Nov
2024

Cisco Identity Services Engine Flaw Bypass Authorization Mechanisms

Cisco has disclosed multiple vulnerabilities impacting its Identity Services Engine (ISE) software. These vulnerabilities could allow authenticated, remote attackers to…