Hackers Using Polyglot Files In Wild, Here Comes PolyConv For Detection
Polyglot files have to fit in several file format specifications and respond differently depending on the calling program. This poses...
Read more →Polyglot files have to fit in several file format specifications and respond differently depending on the calling program. This poses...
Read more →Google has unveiled kvmCTF, a new vulnerability reward program (VRP) explicitly targeting the Kernel-based Virtual Machine (KVM) hypervisor. This initiative,...
Read more →Hackers often mimic penetration testing services to disguise their malicious activities as legitimate security assessments. By imitating authorized security testing,...
Read more →A new Orcinius Trojan has been discovered, employing VBA Stomping to hide its infection. The multi-stage trojan uses Dropbox and...
Read more →Transparent Tribe (aka APT36) has been active since 2016, focusing on social engineering strategies to target Indian government and military...
Read more →Water Sigbin (8220 Gang) exploits vulnerabilities (CVE-2017-3506, CVE-2023-21839) in Oracle WebLogic servers to deliver cryptocurrency miners using PowerShell scripts. They...
Read more →Rapid7, Inc., a leader in extended risk and threat detection, has announced a definitive agreement to acquire Noetic Cyber, a...
Read more →The Qualys Threat Research Unit has identified a newly discovered vulnerability in OpenSSH, dubbed “regreSSHion” (CVE-2024-6387). This critical flaw, which...
Read more →TeamViewer has confirmed that the cyberattack on its systems was orchestrated by Russian threat actors, specifically the APT29 or Midnight...
Read more →A malware campaign of huge magnitude, and perhaps run by just one group, is using artificially nested files for distribution...
Read more →Microsoft has issued a new alert to its users, updating them on the continued threat posed by Midnight Blizzard, a...
Read more →Hackers abuse Mac Stealer to covertly extract sensitive information such as passwords, financial data, and personal files from macOS devices....
Read more →