Cybersecurity Blog
New Qilin Ransomware Attack Uses VPN Credentials, Steals Chrome Data
The threat actors behind a recently observed Qilin ransomware attack have stolen credentials stored in Google Chrome ...
PoC Exploit Released for RCE 0-day CVE-2024-41992 in Arcadyan FMIMG51AX000J Model
A PoC exploit has been released for a critical vulnerability (CVE-2024-41992) found in the Arcadyan FMIMG51AX000J model, ...
Fraudulent Slack Ad Shows Malvertiser’s Patience and Skills
The suspicious ad for Slack appeared legitimate but was likely malicious. Clicking on it would initially redirect to ...
New Opportunistic Campaign Exploit Log4j Vulnerability for Cryptomining and System Compromise
This latest Log4j exploitation-based attack uses obfuscated LDAP requests to evade detection and executes malicious ...
Hardware Backdoor in Millions of Shanghai Fudan Microelectronics RFID Cards Allows Cloning
Researchers from Quarkslab found a hardware backdoor in the FM11RF08S RFID cards manufactured by Shanghai Fudan ...
Cybercriminals Exploit File Sharing Services to Advance Phishing Attacks
In these file-sharing phishing attacks, cybercriminals impersonate colleagues or trusted services to trick targets into ...
Critical GitHub Enterprise Server Flaw Patched, Admin Access at Risk
GitHub disclosed three security vulnerabilities in GitHub Enterprise Server (GHES), including CVE-2024-6800, ...
New macOS Malware “Cthulhu Stealer” Targets Apple Users’ Data
Cybersecurity researchers have uncovered a new information stealer that’s designed to target Apple macOS hosts and ...