Hackers Target macOS Users with Malicious Ads Spreading Stealer Malware

30/03/2024 0 Comments 0 tags

Malicious ads and bogus websites are acting as a conduit to deliver two different stealer malware, including Atomic Stealer, targeting Apple macOS users. The ongoing infostealer attacks targeting macOS users

Urgent: Secret Backdoor Found in XZ Utils Library, Impacts Major Linux Distros

30/03/2024 0 Comments 0 tags

RedHat on Friday released an “urgent security alert” warning that two versions of a popular data compression library called XZ Utils (previously LZMA Utils) have been backdoored with malicious code designed to

Dormakaba Locks Used in Millions of Hotel Rooms Could Be Cracked in Seconds

29/03/2024 0 Comments 0 tags

Security vulnerabilities discovered in Dormakaba’s Saflok electronic RFID locks used in hotels could be weaponized by threat actors to forge keycards and stealthily slip into locked rooms. The shortcomings have

The Golden Age of Automated Penetration Testing is Here

29/03/2024 0 Comments 0 tags

Network penetration testing plays a vital role in detecting vulnerabilities that can be exploited. The current method of performing pen testing is pricey, leading many companies to undertake it only

TheMoon Botnet Resurfaces, Exploiting EoL Devices to Power Criminal Proxy

29/03/2024 0 Comments 0 tags

A botnet previously considered to be rendered inert has been observed enslaving end-of-life (EoL) small home/small office (SOHO) routers and IoT devices to fuel a criminal proxy service called Faceless.

New Linux Bug Could Lead to User Password Leaks and Clipboard Hijacking

29/03/2024 0 Comments 0 tags

Details have emerged about a vulnerability impacting the “wall” command of the util-linux package that could be potentially exploited by a bad actor to leak a user’s password or alter

PyPI Halts Sign-Ups Amid Surge of Malicious Package Uploads Targeting Developers

29/03/2024 0 Comments 0 tags

The maintainers of the Python Package Index (PyPI) repository briefly suspended new user sign-ups following an influx of malicious projects uploaded as part of a typosquatting campaign. It said “new project creation

Darcula Phishing Network Leveraging RCS and iMessage to Evade Detection

28/03/2024 0 Comments 0 tags

A sophisticated phishing-as-a-service (PhaaS) platform called Darcula has set its sights on organizations in over 100 countries by leveraging a massive network of more than 20,000 counterfeit domains to help cyber criminals

Finland Blames Chinese Hacking Group APT31 for Parliament Cyber Attack

28/03/2024 0 Comments 0 tags

The Police of Finland (aka Poliisi) has formally accused a Chinese nation-state actor tracked as APT31 for orchestrating a cyber attack targeting the country’s Parliament in 2020. The intrusion, per

Linux Version of DinodasRAT Spotted in Cyber Attacks Across Several Countries

28/03/2024 0 Comments 0 tags

A Linux version of a multi-platform backdoor called DinodasRAT has been detected in the wild targeting China, Taiwan, Turkey, and Uzbekistan, new findings from Kaspersky reveal. DinodasRAT, also known as XDealer, is a C++-based