malware

SECURITY AFFAIRS MALWARE NEWSLETTER – ROUND 16<gwmw style="display:none;"></gwmw><gwmw style="display:none;"></gwmw>

Security Affairs Malware newsletter includes a collection of the best articles and research on malware in the international landscape. Security…

1 year ago

Security Affairs newsletter Round 494 by Pierluigi Paganini – INTERNATIONAL EDITION

A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from Security Affairs are free…

1 year ago

North Korea-linked APT37 exploited IE zero-day in a recent attack

North Korea-linked group APT37 exploited an Internet Explorer zero-day vulnerability in a supply chain attack. A North Korea-linked threat actor,…

1 year ago

Russia-linked RomCom group targeted Ukrainian government agencies since late 2023

Russia-linked threat actor RomCom targeted Ukrainian government agencies and Polish entities in cyber attacks since late 2023. Cisco Talos researchers…

1 year ago

A critical flaw in Kubernetes Image Builder could allow attackers to gain root access<gwmw style="display:none;"></gwmw>

A critical flaw in Kubernetes Image Builder could allow attackers to gain root access if exploited under specific conditions. A…

1 year ago

A new Linux variant of FASTCash malware targets financial systems

North Korea-linked actors deploy a new Linux variant of FASTCash malware to target financial systems, researcher HaxRob revealed. The cybersecurity…

1 year ago

Security Affairs newsletter Round 493 by Pierluigi Paganini – INTERNATIONAL EDITION

A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from Security Affairs are free…

1 year ago

Ransomware operators exploited Veeam Backup & Replication flaw CVE-2024-40711 in recent attacks<gwmw style="display:none;"></gwmw>

Sophos reports ransomware operators are exploiting a critical code execution flaw in Veeam Backup & Replication. Sophos researchers warn that…

1 year ago

Iran and China-linked actors used ChatGPT for preparing attacks<gwmw style="display:none;"></gwmw>

OpenAI disrupted 20 cyber and influence operations in 2023, revealing Iran and China-linked actors used ChatGPT for planning ICS attacks.…

1 year ago

E-skimming campaign uses Unicode obfuscation to hide the Mongolian Skimmer

Jscrambler researchers found a skimming campaign using unique JavaScript obfuscation with accented characters to hide a skimmer named Mongolian Skimmer.…

1 year ago

This website uses cookies.