Hackers Abuse EDRSilencer Tool to Bypass Security and Hide Malicious Activity

16/10/2024 0 Comments 0 tags

Threat actors are attempting to abuse the open-source EDRSilencer tool as part of efforts to tamper endpoint detection and response (EDR) solutions and hide malicious activity. Trend Micro said it

North Korean ScarCruft Exploits Windows Zero-Day to Spread RokRAT Malware

16/10/2024 0 Comments 0 tags

The North Korean threat actor known as ScarCruft has been linked to the zero-day exploitation of a now-patched security flaw in Windows to infect devices with malware known as RokRAT.

From Misuse to Abuse: AI Risks and Attacks

16/10/2024 0 Comments 0 tags

AI from the attacker’s perspective: See how cybercriminals are leveraging AI and exploiting its vulnerabilities to compromise systems, users, and even other AI applications Cybercriminals and AI: The Reality vs.

5 Techniques for Collecting Cyber Threat Intelligence

16/10/2024 0 Comments 0 tags

To defend your organization against cyber threats, you need a clear picture of the current threat landscape. This means constantly expanding your knowledge about new and ongoing threats. There are

Astaroth Banking Malware Resurfaces in Brazil via Spear-Phishing Attack

16/10/2024 0 Comments 0 tags

A new spear-phishing campaign targeting Brazil has been found delivering a banking malware called Astaroth (aka Guildma) by making use of obfuscated JavaScript to slip past security guardrails. “The spear-phishing

CISA Warns of Active Exploitation in SolarWinds Help Desk Software Vulnerability

16/10/2024 0 Comments 0 tags

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday added a critical security flaw impacting SolarWinds Web Help Desk (WHD) software to its Known Exploited Vulnerabilities (KEV) catalog, citing

GitHub Patches Critical Flaw in Enterprise Server Allowing Unauthorized Instance Access

16/10/2024 0 Comments 0 tags

GitHub has released security updates for Enterprise Server (GHES) to address multiple issues, including a critical bug that could allow unauthorized access to an instance. The vulnerability, tracked as CVE-2024-9487,

TrickMo Banking Trojan Can Now Capture Android PINs and Unlock Patterns

15/10/2024 0 Comments 0 tags

New variants of an Android banking trojan called TrickMo have been found to harbor previously undocumented features to steal a device’s unlock pattern or PIN. “This new addition enables the

Researchers Uncover Hijack Loader Malware Using Stolen Code-Signing Certificates

15/10/2024 0 Comments 0 tags

Cybersecurity researchers have disclosed a new malware campaign that delivers Hijack Loader artifacts that are signed with legitimate code-signing certificates. French cybersecurity company HarfangLab, which detected the activity at the

China Accuses U.S. of Fabricating Volt Typhoon to Hide Its Own Hacking Campaigns

15/10/2024 0 Comments 0 tags

China’s National Computer Virus Emergency Response Center (CVERC) has doubled down on claims that the threat actor known as Volt Typhoon is a fabrication of the U.S. and its allies. The