SugarGh0st RAT Delivered via Malicious Windows & JavaScript
Hackers use Remote Access Trojans (RATs) to gain unauthorized access and control over a victim’s computer remotely. RATs allow threat actors to execute the following…
Hackers use Remote Access Trojans (RATs) to gain unauthorized access and control over a victim’s computer remotely. RATs allow threat actors to execute the following…
Attackers are exploiting three critical vulnerabilities in internet-facing Qlik Sense instances to deliver Cactus ransomware to target organizations, Arctic Wolf researchers have warned. The exploited…
Dec 01, 2023NewsroomPrivacy / Data Protection Meta-owned WhatsApp has launched a new Secret Code feature to help users protect sensitive conversations with a custom password…
In a post-Covid world all organisations have had to adapt to new ways of working. The transition to remote working was fast paced, reactive and…
The ScrubCrypt obfuscation tool has been discovered to be utilized in attacks to disseminate the RedLine Stealer malware, and its new variant was being marketed in underground communities. Threat actors use…
Dec 01, 2023NewsroomMalware / Cyber Espionage A suspected Chinese-speaking threat actor has been attributed to a malicious campaign that targets the Uzbekistan Ministry of Foreign…
Almost 60% of workers in the UK have had no training in digital skills, according to research by CV Genius. Looking into data from several…
Zyxel has patched six vulnerabilities affecting its network attached storage (NAS) devices, including several (OS) command injection flaws that can be easily exploited by unauthenticated…
Dec 01, 2023The Hacker NewsMalware / Cyber Threat The U.S. Department of Justice (DOJ) and the FBI recently collaborated in a multinational operation to dismantle…
CISA adds ownCloud and Google Chrome bugs to its Known Exploited Vulnerabilities catalog Pierluigi Paganini December 01, 2023 US CISA added ownCloud and Google Chrome vulnerabilities…
Black Basta, the fourth-most active ransomware strain with more than 329 victims, has reportedly made over $100 million in ransom payments. This ransomware has also…
Today marks the day when Google makes good on its new policy to reserve the right to delete inactive accounts after two years of inactivity.…