Category: CyberSecurityNews

Malicious PyPI Packages Mimics a Legitimate Tools
07
Oct
2024

Malicious PyPI Packages Mimics a Legitimate Tools

Threat actors target the “PyPI” primarily due to its vast user base and the ease of distributing malicious packages within…

Beware Of Fraudulent Trading Apps From Apple And Google Play Store That Steal Login Credentials
07
Oct
2024

Beware Of Fraudulent Trading Apps From Apple And Google Play Store That Steal Login Credentials

⁤Fraudulent trading apps have emerged as a significant threat to users in cyberspace. As these applications target and lure victims…

Hackers Exploit CosmicSting Flaw to Hack 1000+ Adobe Commerce & Magento Stores
07
Oct
2024

Hackers Exploit CosmicSting Flaw to Hack 1000+ Adobe Commerce & Magento Stores

Adobe Commerce (formerly known as Magento) is a robust e-commerce platform owned by Adobe that provides flexible and scalable solutions…

LEGO Website Hacked to Promote a Crypto Scam
07
Oct
2024

LEGO Website Hacked to Promote a Crypto Scam

Cryptocurrency scammers temporarily compromised the LEGO website to deceive fans into buying a fake “LEGO Coin” cryptocurrency. The breach occurred…

North Korean Hackers Attacking U.S. Organizations With Unique Hacking Tools
07
Oct
2024

North Korean Hackers Attacking U.S. Organizations With Unique Hacking Tools

⁤Cyber extortion is a cybercrime under which the threat actors illicitly access “sensitive data” in systems and demand a “ransom”…

CISA Warns Active Exploitation of Zimbra & Ivanti Endpoint Manager Vulnerability
04
Oct
2024

CISA Warns Active Exploitation of Zimbra & Ivanti Endpoint Manager Vulnerability

The Cybersecurity and Infrastructure Security Agency (CISA) has issued an urgent alert regarding the active exploitation of critical vulnerabilities in…

Hackers Turned Visual Studio Code As A Remote Access Tool
04
Oct
2024

Hackers Turned Visual Studio Code As A Remote Access Tool

Visual Studio is a powerful integrated development environment from Microsoft and it’s primarily used for developing apps on the “.NET…

Perfctl Malware
04
Oct
2024

New Perfctl Malware Attacking Millions of Linux Servers

A sophisticated and elusive malware known as “Perfctl,” has been discovered targeting millions of Linux servers worldwide. Researchers at Aqua…

Attack Surface Management to the Rescue – Find, Fix, Fortify Your ASM with Criminal IP
03
Oct
2024

Attack Surface Management to the Rescue – Find, Fix, Fortify Your ASM with Criminal IP

An exclusive live webinar will take place on October 4th at noon Eastern Time (ET), demonstrating how Criminal IP’s Attack…

SquareX Shows How Malicious Extensions Bypass Google’s MV3 Restrictions
03
Oct
2024

SquareX Shows How Malicious Extensions Bypass Google’s MV3 Restrictions

At DEF CON 32, the SquareX research team delivered a hard-hitting presentation titled Sneaky Extensions: The MV3 Escape Artists where…

How To Collect Malware Indicators Of Compromise In The ANY.RUN Sandbox
03
Oct
2024

How To Collect Malware Indicators Of Compromise In The ANY.RUN Sandbox

Indicators of Compromise (IOCs) are critical forensic artifacts that cybersecurity researchers use to “detect,” “investigate,” and “mitigate” security threats. As…

Telegram API to Intercept Data Exfiltrated by Malware
03
Oct
2024

How Analysts Use Telegram API to Intercept Data Exfiltrated by Malware

Threat actors are increasingly relying on Telegram and Discord apps for data exfiltration. Analysts at ANY.RUN shared a detailed guide…