New Cryptojacking Campaign Strikes CentOS

New Cryptojacking Campaign Strikes CentOS

Overview of the Attack A new cryptojacking campaign targeting Virtual Private Server (VPS) infrastructures running on the CentOS operating system has been identified, with evidence pointing towards the notorious TeamTNT group. You might be interested in: Hackers Use MacroPack to Deploy Malware…


0 Comments4 Minutes

Americans Increasingly Rely on TikTok for News

Americans Increasingly Rely on TikTok for News

More Americans Rely on TikTok for News A recent study by the Pew Research Center reveals that a growing number of adults in the U.S. are turning to TikTok as a regular source of news. This shift is especially notable among younger generations, with adults under 30 driving the increase. The…


0 Comments7 Minutes

SolarWinds Patches Critical ARM Flaw

SolarWinds Patches Critical ARM Flaw

Major Security Flaws Addressed in SolarWinds ARM Software SolarWinds has recently patched two security vulnerabilities found in its Access Rights Manager (ARM) software. One of these flaws was particularly concerning, as it could potentially allow remote code execution. The most serious issue,…


0 Comments3 Minutes

Google Patches GCP Composer Vulnerability

Google Patches GCP Composer Vulnerability

Vulnerability in Google Cloud Platform Exposed Users to Attacks A serious vulnerability found in Google Cloud Platform (GCP) Composer has been patched after it was revealed that attackers could have used it to remotely run malicious code through a supply chain attack method known as dependency…


0 Comments4 Minutes

New ScRansom Ransomware from CosmicBeetle and RansomHub

New ScRansom Ransomware from CosmicBeetle and RansomHub

CosmicBeetle’s New Ransomware: ScRansom Introduction CosmicBeetle, a cybercriminal group, has developed a new strain of ransomware known as ScRansom. This malware is being used to target small and medium-sized businesses (SMBs) across Europe, Asia, Africa, and South America. Some analysts believe…


0 Comments5 Minutes

WordPress Now Requires 2FA for Developers

WordPress Now Requires 2FA for Developers

Starting October 1, 2024, WordPress.org will introduce a new security requirement for users who can update plugins and themes. These users will now be required to enable two-factor authentication (2FA) to enhance account protection. You might be interested in: Microsoft macOS Apps Vulnerable to…


0 Comments4 Minutes

Quad7 Botnet Targets More Routers and VPNs

Quad7 Botnet Targets More Routers and VPNs

Overview of the Quad7 Botnet The Quad7 botnet, also known as 7777, has recently been gaining attention due to its ongoing and evolving attacks on a variety of Small Office Home Office (SOHO) routers and VPN appliances. The operators behind this botnet are frequently altering their tactics by…


0 Comments6 Minutes

RAMBO Attack: Data Theft via Radio

RAMBO Attack: Data Theft via Radio

A Radio-Based Method for Data Theft A newly discovered side-channel attack named RAMBO uses radio frequencies emitted by a computer’s random access memory (RAM) to steal sensitive data. This poses a significant risk even for networks that are not connected to the internet. You might be interested…


0 Comments6 Minutes

Telegram CEO Pavel Durov Speaks Out After Arrest in France

Telegram CEO Pavel Durov Speaks Out After Arrest in France

Durov Defends Himself Against Unfair Charges It’s been nearly two weeks since Telegram’s CEO, Pavel Durov, was arrested in France. Recently, he broke his silence, addressing the accusations against him in a 600-word message on Telegram, where he criticized the charges as unjust. Durov pointed out,…


0 Comments5 Minutes

Hackers Use MacroPack to Deploy Malware

Threat Actors Repurposing a Security Tool for Harmful Intentions Cisco Talos researchers have discovered that cybercriminals are likely misusing a tool originally designed for red team security drills to spread malware. You might be interested in: AMD Hacked Again: Sensitive Data Exposed The…


0 Comments3 Minutes