Iran-linked Charming Kitten APT enhanced its POWERSTAR BackdoorSecurity Affairs
Iran-linked Charming Kitten group used an updated version of the PowerShell backdoor called POWERSTAR in a spear-phishing campaign. Security firm...
Read more →Iran-linked Charming Kitten group used an updated version of the PowerShell backdoor called POWERSTAR in a spear-phishing campaign. Security firm...
Read more →North Korea-linked cyberespionage group Andariel used a previously undocumented malware called EarlyRat. Kaspersky researchers reported that the North Korea-linked APT group Andariel used a previously...
Read more →A critical authentication bypass flaw in miniOrange’s WordPress Social Login and Register plugin, can allow gaining access to any account on a...
Read more →Android app LetMeSpy disclosed a security breach, sensitive data associated with thousands of Android users were exposed. The phone monitoring app LetMeSpy...
Read more →A new Windows information stealer dubbed ThirdEye appeared in the threat landscape, it has been active since April. Fortinet FortiGuard Labs discovered...
Read more →The former head of network security at Group-IB has been arrested in Kazakhstan based on a request from U.S. law...
Read more →Data protection firm Arcserve addressed an authentication bypass vulnerability in its Unified Data Protection (UDP) backup software. Data protection vendor...
Read more →Electromagnetic fault injection (EMFI) attacks on drones can potentially allow attackers to achieve arbitrary code execution and take over them....
Read more →Researchers warn of a massive spike in May and June 2023 of the activity associated with the ransomware group named 8Base....
Read more →SQL injection vulnerabilities in Gentoo Soko could lead to remote code execution (RCE) on impacted systems. SonarSource researchers discovered two...
Read more →Europol announced that the takedown of the EncroChat encrypted chat network has led to the arrest of 6,558 people and...
Read more →Mockingjay is a new process injection technique that can be exploited to bypass security solutions to execute malware on compromised...
Read more →