Cybersecurity Blog
Earth Freybug Uses UNAPIMON for Unhooking Critical APIs
First cc.bat for reconnaissance Once the scheduled task is triggered, a previously deployed batch file, %System%cc.bat, ...
Threat Actors Deliver Malware via YouTube Video Game Cracks | Proofpoint US
Key takeaways Proofpoint identified multiple YouTube channels distributing malware by promoting cracked and pirated ...
Attack Surface Management vs. Vulnerability Management
Apr 03, 2024The Hacker NewsCybersecurity / Penetration Testing Attack surface management (ASM) and vulnerability ...
Mispadu Trojan Targets Europe, Thousands of Credentials Compromised
The banking trojan known as Mispadu has expanded its focus beyond Latin America (LATAM) and Spanish-speaking individuals ...
Critical Security Flaw Found in Popular LayerSlider WordPress Plugin
Apr 03, 2024NewsroomWeb Security / Vulnerability A critical security flaw impacting the LayerSlider plugin for ...
Malicious Code in XZ Utils for Linux Systems Enables Remote Code Execution
The malicious code inserted into the open-source library XZ Utils, a widely used package present in major Linux ...
Harnessing the Power of CTEM for Cloud Security
Cloud solutions are more mainstream – and therefore more exposed – than ever before. In 2023 alone, a staggering 82% of ...
China-linked Hackers Deploy New ‘UNAPIMON’ Malware for Stealthy Operations
Apr 02, 2024NewsroomCyber Espionage / Threat Intelligence A threat activity cluster tracked as Earth Freybug has been ...