Cybersecurity Blog
Styx Stealer Creator’s OPSEC Fail Leaks Client List and Profit Details
In what’s a case of an operational security (OPSEC) lapse, the operator behind a new information stealer called ...
New Msupedge Backdoor Targeting Taiwan Employs Stealthy Communications
Hackers have been using a PHP vulnerability to deploy a stealthy backdoor called Msupedge. This backdoor was recently ...
New macOS Malware TodoSwift Linked to North Korean Hacking Groups
Cybersecurity researchers have uncovered a new macOS malware strain dubbed TodoSwift that they say exhibits ...
RCE Vulnerability in Atlassian Bamboo Data Center and Server
This flaw, present in versions 9.1.0 through 9.6.0, allows authenticated attackers to execute arbitrary code within the ...
Spring Security Flaw Leaves Applications Open to Unauthorized Access
A high-severity vulnerability (CVE-2024-38810) has been discovered in Spring Security, potentially allowing unauthorized ...
Unmasking Styx Stealer: How a Hacker’s Slip Led to an Intelligence Treasure Trove
Styx Stealer is based on the Phemedrone Stealer and is available for purchase online. It has the ability to steal ...
Rising Abuse of URL Rewriting in Phishing
The abuse of URL rewriting in phishing attacks has emerged as a new trend, allowing threat actors to hide malicious ...
Over 10,000 WordPress Sites at Risk: Critical File Deletion Flaw Found in InPost Plugins
The vulnerability, known as CVE-2024-6500, affects the InPost PL and InPost for WooCommerce plugins, allowing attackers ...