Researchers Unveal GuLoader Malware’s Latest Anti-Analysis Techniques

09/12/2023 0 Comments 0 tags

Threat hunters have unmasked the latest tricks adopted by a malware strain called GuLoader in an effort to make analysis more challenging. “While GuLoader’s core functionality hasn’t changed drastically over the past

SLAM Attack: New Spectre-based Vulnerability Impacts Intel, AMD, and Arm CPUs

09/12/2023 0 Comments 0 tags

Researchers from the Vrije Universiteit Amsterdam have disclosed a new side-channel attack called SLAM that could be exploited to leak sensitive information from kernel memory on current and upcoming CPUs from Intel,

Founder of Bitzlato Cryptocurrency Exchange Pleads Guilty in Money-Laundering Scheme

09/12/2023 0 Comments 0 tags

The Russian founder of the now-defunct Bitzlato cryptocurrency exchange has pleaded guilty, nearly 11 months after he was arrested in Miami earlier this year. Anatoly Legkodymov (aka Anatolii Legkodymov, Gandalf, and Tolik),

WordPress Releases Update 6.4.2 to Address Critical Remote Attack Vulnerability

09/12/2023 0 Comments 0 tags

WordPress has released version 6.4.2 with a patch for a critical security flaw that could be exploited by threat actors by combining it with another bug to execute arbitrary PHP

Mac Users Beware: New Trojan-Proxy Malware Spreading via Pirated Software

09/12/2023 0 Comments 0 tags

Unauthorized websites distributing trojanized versions of cracked software have been found to infect Apple macOS users with a new Trojan-Proxy malware. “Attackers can use this type of malware to gain money by

Ransomware-as-a-Service: The Growing Threat You Can’t Ignore

09/12/2023 0 Comments 0 tags

Ransomware attacks have become a significant and pervasive threat in the ever-evolving realm of cybersecurity. Among the various iterations of ransomware, one trend that has gained prominence is Ransomware-as-a-Service (RaaS). This

N. Korean Kimsuky Targeting South Korean Research Institutes with Backdoor Attacks

09/12/2023 0 Comments 0 tags

The North Korean threat actor known as Kimsuky has been observed targeting research institutes in South Korea as part of a spear-phishing campaign with the ultimate goal of distributing backdoors on compromised

New 5G Modems Flaws Affect iOS Devices and Android Models from Major Brands

09/12/2023 0 Comments 0 tags

A collection of security flaws in the firmware implementation of 5G mobile network modems from major chipset vendors such as MediaTek and Qualcomm impact USB and IoT modems as well

Governments May Spy on You by Requesting Push Notifications from Apple and Google

07/12/2023 0 Comments 0 tags

Unspecified governments have demanded mobile push notification records from Apple and Google users to pursue people of interest, according to U.S. Senator Ron Wyden. “Push notifications are alerts sent by

Building a Robust Threat Intelligence with Wazuh

07/12/2023 0 Comments 0 tags

Threat intelligence refers to gathering, processing, and analyzing cyber threats, along with proactive defensive measures aimed at strengthening security. It enables organizations to gain a comprehensive insight into historical, present,