Using Legitimate GitHub URLs for Malware
Interesting social-engineering attack vector: McAfee released a report on a new LUA malware loader distributed through what appeared to be…
Interesting social-engineering attack vector: McAfee released a report on a new LUA malware loader distributed through what appeared to be…
A financially motivated group named GhostR claims the theft of a sensitive database from World-Check and threatens to publish it.…
Wallarm introduced its ongoing Open Source API Firewall project to the world at the recently concluded Blackhat Asia 2024 conference…
Researcher demonstrated how to exploit vulnerabilities in the Windows DOS-to-NT path conversion process to achieve rootkit-like capabilities. SafeBreach researcher Or…
Japan’s CERT warns of a vulnerability in the Forminator WordPress plugin that allows unrestricted file uploads to the server. Japan’s…
India ranks 10th in cybercrime as per the recent “World Cybercrime Index” In the recently released “World Cybercrime… The post…
Government agencies revealed that Akira ransomware has breached over 250 entities worldwide and received over $42 million in ransom payments.…
Threat actors target government entities in the Middle East with a new backdoor dubbed CR4T as part of an operation…
A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from Security Affairs are free…
Threat actors exploited a critical zero-day vulnerability in the CrushFTP enterprise in targeted attacks, Crowdstrike experts warn. CrushFTP is a…