This Malware Turned Thousands of Hacked Windows and macOS PCs into Proxy Servers

21/08/2023 0 Comments 0 tags

Threat actors are leveraging access to malware-infected Windows and macOS machines to deliver a proxy server application and use them as exit nodes to reroute proxy requests. According to AT&T

How to Investigate an OAuth Grant for Suspicious Activity or Overly Permissive Scopes

21/08/2023 0 Comments 0 tags

From a user’s perspective, OAuth works like magic. In just a few keystrokes, you can whisk through the account creation process and gain immediate access to whatever new app or

New WinRAR Vulnerability Could Allow Hackers to Take Control of Your PC

21/08/2023 0 Comments 0 tags

A high-severity security flaw has been disclosed in the WinRAR utility that could be potentially exploited by a threat actor to achieve remote code execution on Windows systems. Tracked as CVE-2023-40477 (CVSS

HiatusRAT Malware Resurfaces: Taiwan Firms and U.S. Military Under Attack

21/08/2023 0 Comments 0 tags

The threat actors behind the HiatusRAT malware have returned from their hiatus with a new wave of reconnaissance and targeting activity aimed at Taiwan-based organizations and a U.S. military procurement

WoofLocker Toolkit Hides Malicious Codes in Images to Run Tech Support Scams

19/08/2023 0 Comments 0 tags

Cybersecurity researchers have detailed an updated version of an advanced fingerprinting and redirection toolkit called WoofLocker that’s engineered to conduct tech support scams. The sophisticated traffic redirection scheme was first documented by Malwarebytes in

New Juniper Junos OS Flaws Expose Devices to Remote Attacks – Patch Now

19/08/2023 0 Comments 0 tags

Networking hardware company Juniper Networks has released an “out-of-cycle” security update to address multiple flaws in the J-Web component of Junos OS that could be combined to achieve remote code

Thousands of Android Malware Apps Using Stealthy APK Compression to Evade Detection

19/08/2023 0 Comments 0 tags

Threat actors are using Android Package (APK) files with unknown or unsupported compression methods to elude malware analysis. That’s according to findings from Zimperium, which found 3,300 artifacts leveraging such

New BlackCat Ransomware Variant Adopts Advanced Impacket and RemCom Tools

18/08/2023 0 Comments 0 tags

Microsoft on Thursday disclosed that it found a new version of the BlackCat ransomware (aka ALPHV and Noberus) that embeds tools like Impacket and RemCom to facilitate lateral movement and remote code

New Wave of Attack Campaign Targeting Zimbra Email Users for Credential Theft

18/08/2023 0 Comments 0 tags

A new “mass-spreading” social engineering campaign is targeting users of the Zimbra Collaboration email server with an aim to collect their login credentials for use in follow-on operations. The activity,

The Vulnerability of Zero Trust: Lessons from the Storm 0558 Hack

18/08/2023 0 Comments 0 tags

While IT security managers in companies and public administrations rely on the concept of Zero Trust, APTS (Advanced Persistent Threats) are putting its practical effectiveness to the test. Analysts, on