TheMoon Botnet Resurfaces, Exploiting EoL Devices to Power Criminal Proxy

29/03/2024 0 Comments 0 tags

A botnet previously considered to be rendered inert has been observed enslaving end-of-life (EoL) small home/small office (SOHO) routers and IoT devices to fuel a criminal proxy service called Faceless.

New Linux Bug Could Lead to User Password Leaks and Clipboard Hijacking

29/03/2024 0 Comments 0 tags

Details have emerged about a vulnerability impacting the “wall” command of the util-linux package that could be potentially exploited by a bad actor to leak a user’s password or alter

PyPI Halts Sign-Ups Amid Surge of Malicious Package Uploads Targeting Developers

29/03/2024 0 Comments 0 tags

The maintainers of the Python Package Index (PyPI) repository briefly suspended new user sign-ups following an influx of malicious projects uploaded as part of a typosquatting campaign. It said “new project creation

Darcula Phishing Network Leveraging RCS and iMessage to Evade Detection

28/03/2024 0 Comments 0 tags

A sophisticated phishing-as-a-service (PhaaS) platform called Darcula has set its sights on organizations in over 100 countries by leveraging a massive network of more than 20,000 counterfeit domains to help cyber criminals

Finland Blames Chinese Hacking Group APT31 for Parliament Cyber Attack

28/03/2024 0 Comments 0 tags

The Police of Finland (aka Poliisi) has formally accused a Chinese nation-state actor tracked as APT31 for orchestrating a cyber attack targeting the country’s Parliament in 2020. The intrusion, per

Linux Version of DinodasRAT Spotted in Cyber Attacks Across Several Countries

28/03/2024 0 Comments 0 tags

A Linux version of a multi-platform backdoor called DinodasRAT has been detected in the wild targeting China, Taiwan, Turkey, and Uzbekistan, new findings from Kaspersky reveal. DinodasRAT, also known as XDealer, is a C++-based

New ZenHammer Attack Bypasses Rowhammer Defenses on AMD CPUs

28/03/2024 0 Comments 0 tags

Cybersecurity researchers from ETH Zurich have developed a new variant of the RowHammer DRAM (dynamic random-access memory) attack that, for the first time, successfully works against AMD Zen 2 and

Behind the Scenes: The Art of Safeguarding Non-Human Identities

28/03/2024 0 Comments 0 tags

In the whirlwind of modern software development, teams race against time, constantly pushing the boundaries of innovation and efficiency. This relentless pace is fueled by an evolving tech landscape, where

New Webinar: Avoiding Application Security Blind Spots with OPSWAT and F5

28/03/2024 0 Comments 0 tags

Considering the ever-changing state of cybersecurity, it’s never too late to ask yourself, “am I doing what’s necessary to keep my organization’s web applications secure?” The continuous evolution of technology

Telegram Offers Premium Subscription in Exchange for Using Your Number to Send OTPs

28/03/2024 0 Comments 0 tags

In June 2017, a study of more than 3,000 Massachusetts Institute of Technology (MIT) students published by the National Bureau for Economic Research (NBER) found that 98% of them were willing to give away