New Qilin Ransomware Attack Uses VPN Credentials, Steals Chrome Data

The threat actors behind a recently observed Qilin ransomware attack have stolen credentials stored in Google Chrome ...

PoC Exploit Released for RCE 0-day CVE-2024-41992 in Arcadyan FMIMG51AX000J Model

A PoC exploit has been released for a critical vulnerability (CVE-2024-41992) found in the Arcadyan FMIMG51AX000J model, ...

Fraudulent Slack Ad Shows Malvertiser’s Patience and Skills

The suspicious ad for Slack appeared legitimate but was likely malicious. Clicking on it would initially redirect to ...

New Opportunistic Campaign Exploit Log4j Vulnerability for Cryptomining and System Compromise

This latest Log4j exploitation-based attack uses obfuscated LDAP requests to evade detection and executes malicious ...

Hardware Backdoor in Millions of Shanghai Fudan Microelectronics RFID Cards Allows Cloning

Researchers from Quarkslab found a hardware backdoor in the FM11RF08S RFID cards manufactured by Shanghai Fudan ...

Cybercriminals Exploit File Sharing Services to Advance Phishing Attacks

In these file-sharing phishing attacks, cybercriminals impersonate colleagues or trusted services to trick targets into ...

Critical GitHub Enterprise Server Flaw Patched, Admin Access at Risk

GitHub disclosed three security vulnerabilities in GitHub Enterprise Server (GHES), including CVE-2024-6800, ...

New macOS Malware “Cthulhu Stealer” Targets Apple Users’ Data

Cybersecurity researchers have uncovered a new information stealer that’s designed to target Apple macOS hosts and ...

1 59 60 61 62 63 64 65 66 67 68 69 667