New Coyote Trojan Targets 61 Brazilian Banks with Nim-Powered Attack

09/02/2024 0 Comments 0 tags

Sixty-one banking institutions, all of them originating from Brazil, are the target of a new banking trojan called Coyote. “This malware utilizes the Squirrel installer for distribution, leveraging Node.js and a

Hands-on Review: Myrror Security Code-Aware and Attack-Aware SCA

09/02/2024 0 Comments 0 tags

Introduction The modern software supply chain represents an ever-evolving threat landscape, with each package added to the manifest introducing new attack vectors. To meet industry requirements, organizations must maintain a

MoqHao Android Malware Evolves with Auto-Execution Capability

09/02/2024 0 Comments 0 tags

Threat hunters have identified a new variant of Android malware called MoqHao that automatically executes on infected devices without requiring any user interaction. “Typical MoqHao requires users to install and launch the

Raspberry Robin Malware Upgrades with Discord Spread and New Exploits

09/02/2024 0 Comments 0 tags

The operators of Raspberry Robin are now using two new one-day exploits to achieve local privilege escalation, even as the malware continues to be refined and improved to make it stealthier than

Warning: New Ivanti Auth Bypass Flaw Affects Connect Secure and ZTA Gateways

09/02/2024 0 Comments 0 tags

Ivanti has alerted customers of yet another high-severity security flaw in its Connect Secure, Policy Secure, and ZTA gateway devices that could allow attackers to bypass authentication. The issue, tracked

Fortinet Warns of Critical FortiOS SSL VPN Flaw Likely Under Active Exploitation

09/02/2024 0 Comments 0 tags

Fortinet has disclosed a new critical security flaw in FortiOS SSL VPN that it said is likely being exploited in the wild. The vulnerability, CVE-2024-21762 (CVSS score: 9.6), allows for the execution

Stealthy Zardoor Backdoor Targets Saudi Islamic Charity Organizations

09/02/2024 0 Comments 0 tags

An unnamed Islamic non-profit organization in Saudi Arabia has been targeted as part of a stealthy cyber espionage campaign designed to drop a previously undocumented backdoor called Zardoor. Cisco Talos, which

Wazuh in the Cloud Era: Navigating the Challenges of Cybersecurity

09/02/2024 0 Comments 0 tags

Cloud computing has innovated how organizations operate and manage IT operations, such as data storage, application deployment, networking, and overall resource management. The cloud offers scalability, adaptability, and accessibility, enabling

Google Starts Blocking Sideloading of Potentially Dangerous Android Apps in Singapore

08/02/2024 0 Comments 0 tags

Google has unveiled a new pilot program in Singapore that aims to prevent users from sideloading certain apps that abuse Android app permissions to read one-time passwords and gather sensitive

HijackLoader Evolves: Researchers Decode the Latest Evasion Methods

08/02/2024 0 Comments 0 tags

The threat actors behind a loader malware called HijackLoader have added new techniques for defense evasion, as the malware continues to be increasingly used by other threat actors to deliver additional payloads