New Cryptojacking Campaign Strikes CentOS
September 19, 2024
Overview of the Attack A new cryptojacking campaign targeting Virtual Private Server (VPS) infrastructures running on the CentOS operating system has been identified, with evidence pointing towards the notorious TeamTNT group. You might be interested in: Hackers Use MacroPack to Deploy Malware…
0 Comments4 Minutes
Americans Increasingly Rely on TikTok for News
September 18, 2024
More Americans Rely on TikTok for News A recent study by the Pew Research Center reveals that a growing number of adults in the U.S. are turning to TikTok as a regular source of news. This shift is especially notable among younger generations, with adults under 30 driving the increase. The…
0 Comments7 Minutes
SolarWinds Patches Critical ARM Flaw
September 17, 2024
Major Security Flaws Addressed in SolarWinds ARM Software SolarWinds has recently patched two security vulnerabilities found in its Access Rights Manager (ARM) software. One of these flaws was particularly concerning, as it could potentially allow remote code execution. The most serious issue,…
0 Comments3 Minutes
Google Patches GCP Composer Vulnerability
September 16, 2024
Vulnerability in Google Cloud Platform Exposed Users to Attacks A serious vulnerability found in Google Cloud Platform (GCP) Composer has been patched after it was revealed that attackers could have used it to remotely run malicious code through a supply chain attack method known as dependency…
0 Comments4 Minutes
New ScRansom Ransomware from CosmicBeetle and RansomHub
September 13, 2024
CosmicBeetle’s New Ransomware: ScRansom Introduction CosmicBeetle, a cybercriminal group, has developed a new strain of ransomware known as ScRansom. This malware is being used to target small and medium-sized businesses (SMBs) across Europe, Asia, Africa, and South America. Some analysts believe…
0 Comments5 Minutes
WordPress Now Requires 2FA for Developers
September 12, 2024
Starting October 1, 2024, WordPress.org will introduce a new security requirement for users who can update plugins and themes. These users will now be required to enable two-factor authentication (2FA) to enhance account protection. You might be interested in: Microsoft macOS Apps Vulnerable to…
0 Comments4 Minutes
Quad7 Botnet Targets More Routers and VPNs
September 11, 2024
Overview of the Quad7 Botnet The Quad7 botnet, also known as 7777, has recently been gaining attention due to its ongoing and evolving attacks on a variety of Small Office Home Office (SOHO) routers and VPN appliances. The operators behind this botnet are frequently altering their tactics by…
0 Comments6 Minutes
RAMBO Attack: Data Theft via Radio
September 9, 2024
A Radio-Based Method for Data Theft A newly discovered side-channel attack named RAMBO uses radio frequencies emitted by a computer’s random access memory (RAM) to steal sensitive data. This poses a significant risk even for networks that are not connected to the internet. You might be interested…
0 Comments6 Minutes
Telegram CEO Pavel Durov Speaks Out After Arrest in France
September 6, 2024
Durov Defends Himself Against Unfair Charges It’s been nearly two weeks since Telegram’s CEO, Pavel Durov, was arrested in France. Recently, he broke his silence, addressing the accusations against him in a 600-word message on Telegram, where he criticized the charges as unjust. Durov pointed out,…
0 Comments5 Minutes
Hackers Use MacroPack to Deploy Malware
September 5, 2024
Threat Actors Repurposing a Security Tool for Harmful Intentions Cisco Talos researchers have discovered that cybercriminals are likely misusing a tool originally designed for red team security drills to spread malware. You might be interested in: AMD Hacked Again: Sensitive Data Exposed The…
0 Comments3 Minutes