MLNK Builder 4.2 released in Dark Web – malicious shortcut-based attacks are on the rise

4 years ago

Cybercriminals released a new MLNK Builder 4.2 tool for malicious shortcuts (LNK) generation with an improved Powershell and VBS Obfuscator…

Tor Browser 11.5 is optimized to automatically bypass censorship

4 years ago

The Tor Project team has announced the release of Tor Browser 11.5, which introduces functionalities to automatically bypass censorship. The…

A massive cyberattack hit Albania

4 years ago

A synchronized criminal attack from abroad hit Albania over the weekend, all Albanian government systems shut down following the cyberattack.…

Watch out for the CVE-2022-30136 Windows NFS Remote Code Execution flaw

4 years ago

Researchers published an analysis of the Windows remote code execution vulnerability CVE-2022-30136 impacting the Network File System. Trend Micro Research…

Graff paid a $7.5M ransom and sued its insurance firm for refusing to cover this payment

4 years ago

The high-end British jeweler Graff paid a £6 million ransom after the ransomware attack it suffered in 2021. In September…

Crooks stole $375k from Premint NFT, it is one of the biggest NFT hacks ever

4 years ago

Threat actors hacked the popular NFT platform, Premint NFT and stole 314 NFTs. The popular NFT platform, Premint NFT, was…

Google is going to remove App Permissions List from the Play Store

4 years ago

Google is going to remove the app permissions list from the official Play Store for both the mobile app and…

Security Affairs newsletter Round 374 by Pierluigi Paganini

4 years ago

A new round of the weekly Security Affairs newsletter arrived! Every week the best security articles from Security Affairs for…

APT groups target journalists and media organizations since 2021

4 years ago

Researchers from Proofpoint warn that various APT groups are targeting journalists and media organizations since 2021. Proofpoint researchers warn that…

Critical flaw in Netwrix Auditor application allows arbitrary code execution

4 years ago

A vulnerability in the Netwrix Auditor software can be exploited to execute arbitrary code on affected devices. Bishop Fox discovered…

This website uses cookies.