Hacking

Iran-linked Charming Kitten APT enhanced its POWERSTAR Backdoor

Iran-linked Charming Kitten group used an updated version of the PowerShell backdoor called POWERSTAR in a spear-phishing campaign. Security firm…

3 years ago

miniOrange’s WordPress Social Login and Register plugin was affected by a critical auth bypass bug

A critical authentication bypass flaw in miniOrange’s WordPress Social Login and Register plugin, can allow gaining access to any account on a…

3 years ago

North Korea-linked Andariel APT used a new malware named EarlyRat last year

North Korea-linked cyberespionage group Andariel used a previously undocumented malware called EarlyRat. Kaspersky researchers reported that the North Korea-linked APT group Andariel used a previously…

3 years ago

Experts published PoC exploits for Arcserve UDP authentication bypass issue

Data protection firm Arcserve addressed an authentication bypass vulnerability in its Unified Data Protection (UDP) backup software. Data protection vendor…

3 years ago

Using Electromagnetic Fault Injection Attacks to take over drones

Electromagnetic fault injection (EMFI) attacks on drones can potentially allow attackers to achieve arbitrary code execution and take over them.…

3 years ago

Experts warn of a spike in May and June of 8Base ransomware attacks

Researchers warn of a massive spike in May and June 2023 of the activity associated with the ransomware group named 8Base.…

3 years ago

Critical SQL Injection flaws in Gentoo Soko can lead to Remote Code Execution

SQL injection vulnerabilities in Gentoo Soko could lead to remote code execution (RCE) on impacted systems. SonarSource researchers discovered two…

3 years ago

Mockingjay process injection technique allows EDR bypass

Mockingjay is a new process injection technique that can be exploited to bypass security solutions to execute malware on compromised…

3 years ago

Experts found hundreds of devices within federal networks having internet-exposed management interfaces

Researchers at Censys have identified hundreds of devices deployed within federal networks that have internet-exposed management interfaces. Researchers at Censys…

3 years ago

JOKERSPY used to target a cryptocurrency exchange in Japan

An unnamed Japanese cryptocurrency exchange was the victim of a cyber attack aimed at deploying an Apple macOS backdoor named…

3 years ago

This website uses cookies.