Styx Stealer Creator’s OPSEC Fail Leaks Client List and Profit Details

In what’s a case of an operational security (OPSEC) lapse, the operator behind a new information stealer called ...

New Msupedge Backdoor Targeting Taiwan Employs Stealthy Communications

Hackers have been using a PHP vulnerability to deploy a stealthy backdoor called Msupedge. This backdoor was recently ...

New macOS Malware TodoSwift Linked to North Korean Hacking Groups

Cybersecurity researchers have uncovered a new macOS malware strain dubbed TodoSwift that they say exhibits ...

RCE Vulnerability in Atlassian Bamboo Data Center and Server

This flaw, present in versions 9.1.0 through 9.6.0, allows authenticated attackers to execute arbitrary code within the ...

Spring Security Flaw Leaves Applications Open to Unauthorized Access

A high-severity vulnerability (CVE-2024-38810) has been discovered in Spring Security, potentially allowing unauthorized ...

Unmasking Styx Stealer: How a Hacker’s Slip Led to an Intelligence Treasure Trove

Styx Stealer is based on the Phemedrone Stealer and is available for purchase online. It has the ability to steal ...

Rising Abuse of URL Rewriting in Phishing

The abuse of URL rewriting in phishing attacks has emerged as a new trend, allowing threat actors to hide malicious ...

Over 10,000 WordPress Sites at Risk: Critical File Deletion Flaw Found in InPost Plugins

The vulnerability, known as CVE-2024-6500, affects the InPost PL and InPost for WooCommerce plugins, allowing attackers ...

1 63 64 65 66 67 68 69 70 71 72 73 667