Threat Actors Hijacking Websites To Deliver .NET Based Malware
Clearlake is a cyber threat operation that distributes fake antivirus software to make users perceive their system as infected. Sometimes, malicious software can be designed…
Clearlake is a cyber threat operation that distributes fake antivirus software to make users perceive their system as infected. Sometimes, malicious software can be designed…
The giant global electricity network intercrosses the fast-growing solar power infrastructure and ubiquitous Internet of Things, making a complex point of energy and data. This…
In November 2023, hackers from Iran hacked the Municipal Water Authority of Aliquippa, Pennsylvania. They targeted a vulnerable control system and damaged it with anti-Israel…
A popular open-source firewall software pfSense vulnerability has been identified, allowing for remote code execution (RCE) attacks. The vulnerability, tracked as CVE-2022-31814, highlights potential risks…
Researchers at Symantec have identified a new Linux ransomware variant linked to a bilingual (English and Spanish) double-extortion ransomware group. This emerging threat poses significant…
A critical vulnerability, identified as CVE-2024-7553, has been discovered in MongoDB. It could potentially allow attackers to take complete control of Windows systems. This vulnerability…
A recent research presentation at Black Hat USA 2024 revealed architectural vulnerabilities within the Apache HTTP Server, a widely used web server software. The research…
PoC exploit released for critical 0-click remote code execution (RCE) vulnerability affecting Windows Server. This flaw impacts Windows Server versions from 2000 to the latest…
Malware analysis can be challenging, as it often requires in-depth theoretical knowledge and advanced skills. Tools like an interactive sandbox help simplify it, making sophisticated…
The threat actors often exploit fake websites to trick users into revealing their personal data. Not only that, but these fake websites are also used…
Audio-visual data offers invaluable insights into human behavior and communication but raises significant privacy concerns, which proposes MaskAnyone, a toolkit for de-identifying individuals in audio-visual…
A new AMOS Mac stealer variant is circulating, distributed via a fake Loom website hosted on Google Ads, which, potentially linked to the Crazy Evil…