Cybercriminals use nifty tactics to sidestep defensive programs to stay under the radar. One such move has been made by the Masslogger trojan recently. Cisco Talos has discovered an attack campaign utilizing a new Masslogger variant. About the campaign The new Masslogger variant has been designed to retrieve and exfiltrate […]
Malware and Vulnerabilities
According to Malwarebytes 2020 State of Malware Report, Mac threats have increased exponentially in comparison to those against Windows PCs, of course with a difference between the types of threats between the two operating systems. Nonetheless, in the end, it’s about the victims. Lately, researchers have reported new malware threats […]
Widely used web server’s flexibility means mistakes all too easy to make Security researchers at Detectify have discovered a series of middleware misconfigurations in Nginx that could leave web applications vulnerable to attack. Lightweight, modular, open source, and with a user-friendly configuration format, Nginx is one of the most widely-used […]
A botnet used for illicit cryptocurrency mining activities is abusing Bitcoin (BTC) transactions to stay under the radar. According to new research published by Akamai on Tuesday, the technique is being harnessed by operators of a long-running cryptocurrency mining botnet campaign, in which BTC blockchain transactions are being exploited to […]
Ben Dickson 23 February 2021 at 15:01 UTC Updated: 23 February 2021 at 15:14 UTC Developer of ‘systeminformation’ library addresses moderate severity flaw in security update The maintainers of systeminformation, a popular Node.js package, have patched a bug that left applications vulnerable to command injection attacks. Systeminformation provides dozens of […]
At a time when most organizations have rushed to take their events virtual, multiple zero-day vulnerabilities found in event platforms frequented by the Fortune 500 offer hackers access to personal and corporate information. Researchers at Huntress have uncovered software flaws and misconfigurations in two of the top five virtual event platforms: VFairs, […]
VMware has revealed a critical-rated bug in the HTML5 client for its flagship vSphere hybrid cloud suite. “The vSphere Client (HTML5) contains a remote code execution vulnerability in a vCenter Server plugin,” says VMware’s notification. “A malicious actor with network access to port 443 may exploit this issue to execute […]
Introduction In Jan 2021, Zscaler ThreatLabZ discovered new instances of the MINEBRIDGE remote-access Trojan (RAT) embedded in macro-based Word document files crafted to look like valid job resumes (CVs). Such lures are used as social engineering schemes by threat actors; in this case, the malware was targeted at security researchers. […]
Researchers have demonstrated a novel class of attacks that could allow a bad actor to potentially circumvent existing countermeasures and break the integrity protection of digitally signed PDF documents. Called “Shadow attacks” by academics from Ruhr-University Bochum, the technique uses the “enormous flexibility provided by the PDF specification so that […]
Adam Bannister 22 February 2021 at 13:21 UTC Updated: 22 February 2021 at 13:47 UTC Vulnerability that could lead to full environment compromise has now been patched More than 600 enterprises, universities, and government agencies may have inadvertently exposed their ServiceNow login credentials – many with administrator privileges – due […]