BootKitty Linux UEFI bootkit spotted exploiting LogoFAIL flaws

1 year ago

The 'Bootkitty' Linux UEFI bootkit exploits the LogoFAIL flaws (CVE-2023-40238) to target systems using vulnerable firmware. Cybersecurity researchers from ESET…

Tor Project needs 200 WebTunnel bridges more to bypass Russia’ censorship

1 year ago

The Tor Project seeks help deploying 200 WebTunnel bridges by year-end to counter government censorship. Recent reports from Russia show…

Interpol: Operation HAECHI-V led to more than 5,500 suspects arrested

1 year ago

International law enforcement operation Operation HAECHI-V led to more than 5,500 suspects arrested and seized over $400 million. A global…

How threat actors can use generative artificial intelligence?

1 year ago

Generative Artificial Intelligence (GAI) is rapidly revolutionizing various industries, including cybersecurity, allowing the creation of realistic and personalized content. The…

SECURITY AFFAIRS MALWARE NEWSLETTER – ROUND 22

1 year ago

Security Affairs Malware newsletter includes a collection of the best articles and research on malware in the international landscape. A…

Security Affairs newsletter Round 500 by Pierluigi Paganini – INTERNATIONAL EDITION

1 year ago

A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from Security Affairs are free…

Hackers stole millions of dollars from Uganda Central Bank

1 year ago

Financially-motivated threat actors hacked Uganda 's central bank system, government officials confirmed this week. Ugandan officials confirmed on Thursday that…

15 SpyLoan Android apps found on Google Play had over 8 million installs

1 year ago

McAfee researchers discovered 15 SpyLoan Android apps on Google Play with a combined total of over 8 million installs. 15…

Notorious ransomware programmer Mikhail Pavlovich Matveev arrested in Russia

1 year ago

Russian authorities arrested ransomware affiliate Mikhail Matveev, aka Wazawaka, for developing malware and ties to hacking groups. Russian authorities arrested…

Phishing-as-a-Service Rockstar 2FA continues to be prevalent

1 year ago

Phishing tool Rockstar 2FA targets Microsoft 365 credentials, it uses adversary-in-the-middle (AitM) attacks to bypass multi-factor authentication. Trustwave researchers are…

This website uses cookies.