Category: Uncategorized
-
Hackers Exploit Webview2 to Deploy CoinLurker Malware and Evade Security Detection [email protected] (The Hacker News)
Bogus software update lures are being used by threat actors to deliver a new stealer malware called CoinLurker. “Written in Go, CoinLurker employs cutting-edge obfuscation and anti-analysis techniques, making it a highly effective tool in modern cyber attacks,” Morphisec researcher Nadav Lorber said in a technical report published Monday. The attacks make use of fake…
-
What is passwordless authentication?
Post ContentRead More
-
What is PKI (public key infrastructure)?
Post ContentRead More
-
The Mask APT Resurfaces with Sophisticated Multi-Platform Malware Arsenal [email protected] (The Hacker News)
A little-known cyber espionage actor known as The Mask has been linked to a new set of attacks targeting an unnamed organization in Latin America twice in 2019 and 2022. “The Mask APT is a legendary threat actor that has been performing highly sophisticated attacks since at least 2007,” Kaspersky researchers Georgy Kucherin and Marc…
-
CISA and FBI Raise Alerts on Exploited Flaws and Expanding HiatusRAT Campaign [email protected] (The Hacker News)
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added two security flaws to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation in the wild. The list of flaws is below – CVE-2024-20767 (CVSS score: 7.4) – Adobe ColdFusion contains an improper access control vulnerability that could allow an attacker to…
-
Cleo Multiple Products Unrestricted File Upload Vulnerability (CVE-2024-50623)
What is the Vulnerability?An unrestricted file upload and download vulnerability (CVE-2024-50623) that could lead to remote code execution, affecting multiple Cleo products is being actively exploited in the wild. The vulnerability affects the following Cleo products (versions before and including 5.8.0.21)-Cleo Harmony -Cleo VLTrader -Cleo LexiCom Cleo is a software company focused on Managed File…
-
5 UC and collaboration trends reshaping the market in 2025
Post ContentRead More
-
The 10 best cloud security certifications for IT pros in 2025
Post ContentRead More
-
7 DevSecOps tools to secure each step of the SDLC
Post ContentRead More
-
DeceptionAds Delivers 1M+ Daily Impressions via 3,000 Sites, Fake CAPTCHA Pages [email protected] (The Hacker News)
Cybersecurity researchers have shed light on a previously undocumented aspect associated with ClickFix-style attacks that hinge on taking advantage of a single ad network service as part of a malvertising-driven information stealer campaign dubbed DeceptionAds. “Entirely reliant on a single ad network for propagation, this campaign showcases the core mechanisms of malvertising — delivering overRead…