Friday, December 9, 2022

Even the Windows logo isn’t safe from malware

0
It appears that not even the iconic Windows logo is safe from malware (opens in new tab) anymore, as some cybercriminals managed to successfully...

Cyber Attacks Against Middle East Governments Hide Malware in Windows logo

0
An espionage-focused threat actor has been observed using a steganographic trick to conceal a previously undocumented backdoor in a Windows logo in its attacks...

This new Royal ransomware is already asking for millions

0
A brand new ransomware operator has been discovered active in the wild, and even though it’s a new entrant, it’s already demanding major ransom...

New Malware Campaign Targeting Job Seekers with Cobalt Strike Beacons

0
A social engineering campaign leveraging job-themed lures is weaponizing a years-old remote code execution flaw in Microsoft Office to deploy Cobalt Strike beacons on...

WARNING: New Unpatched Microsoft Exchange Zero-Day Under Active Exploitation

0
Security researchers are warning of previously undisclosed flaws in fully patched Microsoft Exchange servers being exploited by malicious actors in real-world attacks to achieve...

Hackers Aid Protests Against Iranian Government with Proxies, Leaks and Hacks

0
Several hacktivist groups are using Telegram and other tools to aid anti-government protests in Iran to bypass regime censorship restrictions amid ongoing unrest in...

New Go-based Malware Attack Windows & Linux Systems

0
The cybersecurity researchers at Lumen’s Black Lotus Labs asserted that in order to mine crypto-currencies and launch DDoS attacks, hackers are deploying an existing...

RCE Bug in ZOHO Products Let Hackers Execute Arbitrary Code Remotely

0
CISA’s bug catalog has been updated with a new vulnerability related to Java deserialization, which has been exploited in the wild by malicious threat...

Swachh City Platform Suffers Data Breach Leaking 16 Million User Records

0
A threat actor by the name of LeakBase has shared a database containing personal information allegedly affecting 16 million users of Swachh City, an...

Should You Use a VPN for Online Security? 4 Types of Malware and How...

0
A VPN creates an encrypted tunnel between your device and the VPN server. All of your data transmissions are protected by the VPN’s encrypted...