Category: hacking attacks

Beware of HotRat: A Dangerous New Variant of Malware Disguised in Pirated Software

Beware of HotRat: A Dangerous New Variant of Malware Disguised in Pirated Software

A new variant of the AsyncRAT malware has emerged, and it’s called HotRat. This malware is being spread through free, pirated versions of popular software and utilities, including video games, image and sound editing software, and Microsoft Office. HotRat is a dangerous malware as it provides attackers with various capabilities. It can steal login credentials,

Read More
The Vulnerability of Local Governments to Ransomware Attacks: Lessons from Oakland, California

The Vulnerability of Local Governments to Ransomware Attacks: Lessons from Oakland, California

variety of possible entry points such as phishing emails, unpatched software vulnerabilities, or weak passwords. Ransomware attacks have become increasingly prevalent in recent years, with hackers targeting local governments and institutions due to their reliance on sensitive data and limited cybersecurity resources. Once the ransomware attack was discovered, Oakland officials immediately activated their emergency response

Read More
BundleBot: The Sneaky Malware Strain Exploiting .NET for Stealthy Data Theft

BundleBot: The Sneaky Malware Strain Exploiting .NET for Stealthy Data Theft

BundleBot: The Sneaky Malware Strain Exploiting .NET Introduction A new malware strain called BundleBot has emerged, cleverly using .NET single-file deployment techniques to fly under the radar and steal sensitive information from compromised hosts. By taking advantage of the dotnet bundle (single-file), self-contained format, threat actors have found a way to avoid detection and carry

Read More
Multiple DDoS Botnets Targeting ISPs and Hosting Providers Exploit Critical Zyxel Vulnerability: Threat Intelligence Report

Multiple DDoS Botnets Targeting ISPs and Hosting Providers Exploit Critical Zyxel Vulnerability: Threat Intelligence Report

and Europe,” write researchers from cybersecurity firm Radware, adding that the botnets are primarily targeting internet service providers (ISPs) and hosting providers. The vulnerability in question, tracked as CVE-2023-9055, affects Zyxel’s network-attached storage (NAS) and firewall products, allowing attackers to execute arbitrary code on targeted devices. The attackers have been leveraging this vulnerability to compromise

Read More
U.S. Cybersecurity Agency Warns of Critical Flaw in Citrix Devices: Immediate Action Required to Protect Against Active Exploitation

U.S. Cybersecurity Agency Warns of Critical Flaw in Citrix Devices: Immediate Action Required to Protect Against Active Exploitation

## U.S. Cybersecurity Agency Warns of Critical Flaw in Citrix Devices ### Introduction The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued an advisory regarding a serious security vulnerability in Citrix NetScaler Application Delivery Controller (ADC) and Gateway devices. The flaw is being actively exploited by threat actors to drop web shells on vulnerable

Read More
Multiple Security Flaws in Apache OpenMeetings: Risks and Mitigation Strategies

Multiple Security Flaws in Apache OpenMeetings: Risks and Mitigation Strategies

Multiple Security Flaws Unveiled in Apache OpenMeetings Summary: A recent report has revealed several security vulnerabilities in Apache OpenMeetings, a popular web conferencing solution. These flaws could potentially be exploited by hackers to gain control of admin accounts and execute malicious code on vulnerable servers. Main Points: – Apache OpenMeetings has been found to have

Read More
Mallox Ransomware Activities Increase by 174% in 2023: A Growing Threat to Organizations

Mallox Ransomware Activities Increase by 174% in 2023: A Growing Threat to Organizations

Mallox Ransomware Activities Witness 174% Increase in 2023 According to new findings from Palo Alto Networks Unit 42, Mallox ransomware activities in 2023 have seen a significant 174% increase compared to the previous year. This alarming rise in ransomware attacks highlights the growing threat that organizations face in the digital landscape. Ransomware Follows the Double

Read More
North Korean State-Sponsored Groups Possibly Involved in JumpCloud Hack

North Korean State-Sponsored Groups Possibly Involved in JumpCloud Hack

North Korean State-Sponsored Groups Possibly Involved in JumpCloud Hack Introduction An analysis conducted by cybersecurity company SentinelOne suggests that North Korean state-sponsored groups may be involved in the recent JumpCloud hack. SentinelOne mapped out the infrastructure related to the intrusion and discovered indicators of compromise (IoCs) that bore similarities to the supply chain attack on

Read More
The Evolution of RDP: From 1996 to the Latest Version 10.0

The Evolution of RDP: From 1996 to the Latest Version 10.0

network connection. Since then, RDP has evolved and seen several updates, with the latest being RDP 10.0. • RDP (Remote Desktop Protocol) has been around since 1996. • It allows users to remotely access and control Windows-based computers. • The latest version of RDP is 10.0. RDP, or Remote Desktop Protocol, has been around for

Read More
Two New Security Flaws Found in AMI MegaRAC BMC Software: Protect Your Servers Now!

Two New Security Flaws Found in AMI MegaRAC BMC Software: Protect Your Servers Now!

Two New Security Flaws Discovered in AMI MegaRAC BMC Software Overview Two recently disclosed vulnerabilities in the AMI MegaRAC Baseboard Management Controller (BMC) software pose a significant threat to server security. These flaws, if successfully exploited, could potentially allow hackers to take control of vulnerable servers and install malicious software. The Vulnerabilities The newly discovered

Read More
0

Your Cart Is Empty

No products in the cart.