Researchers Expose Space Pirates’ Cyber Campaign Across Russia and Serbia

01/08/2023 0 Comments 0 tags

The threat actor known as Space Pirates has been linked to attacks against at least 16 organizations in Russia and Serbia over the past year by employing novel tactics and adding new

China’s APT31 Suspected in Attacks on Air-Gapped Systems in Eastern Europe

01/08/2023 0 Comments 0 tags

A nation-state actor with links to China is suspected of being behind a series of attacks against industrial organizations in Eastern Europe that took place last year to siphon data

Cybercriminals Renting WikiLoader to Target Italian Organizations with Banking Trojan

01/08/2023 0 Comments 0 tags

Organizations in Italy are the target of a new phishing campaign that leverages a new strain of malware called WikiLoader with an ultimate aim to install a banking trojan, stealer, and spyware

New P2PInfect Worm Targets Redis Servers with Undocumented Breach Methods

31/07/2023 0 Comments 0 tags

The P2PInfect peer-to-peer (P2) worm has been observed employing previously undocumented initial access methods to breach susceptible Redis servers and rope them into a botnet. “The malware compromises exposed instances

AVRecon Botnet Leveraging Compromised Routers to Fuel Illegal Proxy Service

31/07/2023 0 Comments 0 tags

More details have emerged about a botnet called AVRecon, which has been observed making use of compromised small office/home office (SOHO) routers as part of a multi-year campaign active since at

Fruity Trojan Uses Deceptive Software Installers to Spread Remcos RAT

31/07/2023 0 Comments 0 tags

Threat actors are creating fake websites hosting trojanized software installers to trick unsuspecting users into downloading a downloader malware called Fruity with the goal of installing remote trojans tools like

Multiple Flaws Found in Ninja Forms Plugin Leave 800,000 Sites Vulnerable

31/07/2023 0 Comments 0 tags

Multiple security vulnerabilities have been disclosed in the Ninja Forms plugin for WordPress that could be exploited by threat actors to escalate privileges and steal sensitive data. The flaws, tracked

Patchwork Hackers Target Chinese Research Organizations Using EyeShell Backdoor

31/07/2023 0 Comments 0 tags

Threat actors associated with the hacking crew known as Patchwork have been spotted targeting universities and research organizations in China as part of a recently observed campaign. The activity, according

Webinar: Riding the vCISO Wave: How to Provide vCISO Services

31/07/2023 0 Comments 0 tags

Demand for Virtual CISO services is soaring. According to Gartner, the use of vCISO services among small and mid-size businesses and non-regulated enterprises was expected to grow by a whopping

New Android Malware CherryBlos Utilizing OCR to Steal Sensitive Data

29/07/2023 0 Comments 0 tags

A new Android malware strain called CherryBlos has been observed making use of optical character recognition (OCR) techniques to gather sensitive data stored in pictures. CherryBlos, per Trend Micro, is distributed via bogus