Content Paint

Intel

PlushDaemon Malware Breaches Korean VPN Service Supply Chain

ESET researchers have unveiled a cyberespionage operation carried out by PlushDaemon, a China-aligned Advanced Persistent Threat (APT) group. This operation involved compromising the supply chain of a South Korean VPN software in 2023, where the attackers replaced the legitimate installer with one that also deployed a sophisticated backdoor known as

7-Zip Patch Released to Fix Bug Bypassing Windows Mark of the Web Security Warnings

A critical flaw in the 7-Zip compression tool has been fixed, addressing a vulnerability that allowed attackers to bypass the Windows Mark of the Web (MotW) security feature, posing significant risks to users. This issue permitted malicious code execution from files extracted through nested archives. MotW Support and Risks Since

Fake Google Ads Exploit Homebrew to Deliver Malware to Mac Users

Cybersecurity researchers have once again unearthed a cunning scheme where threat actors are misusing Google ads to disseminate malware. This time, the attackers have created a counterfeit Homebrew website designed to infiltrate both Mac and Linux systems with an infostealer. This malware seeks to harvest credentials, browser information, and cryptocurrency

FBI Informant Communications Compromised: AT&T Breach Reveals Expanded Damage

A significant breach of AT&T's network by the Chinese state-sponsored group, Salt Typhoon, has led to unauthorized access to sensitive U.S. telecommunications data. Active undetected for over 18 months until 2023, the breach exposed critical communications metadata of FBI informants, potentially creating a crisis for

Scammers Target California Wildfire Victims by Posing as Relief Services

The continuing devastation of the California wildfires has given rise to another threat—cybercriminals seeking to exploit the disaster. These malicious actors are leveraging the chaos, using sophisticated phishing tactics to deceive those impacted by the fires. New Domains Mimic Legitimate Services Researchers at Veriti have discovered a proliferation of

Critical UEFI Secure Boot Flaw Exposes Systems to Malicious Bootkit Attacks

A recently corrected vulnerability has come to light, highlighting a flaw in the Secure Boot mechanism of Unified Extensible Firmware Interface (UEFI) systems. This issue, tracked as CVE-2024-7344 with a CVSS score of 6.7, involves an application signed with Microsoft's third-party UEFI certificate from 2011, as reported

Misconfigured SPF DNS Records Enable MikroTik Botnet to Spread Malware

A sophisticated botnet comprising 13,000 MikroTik devices is leveraging domain name system (DNS) misconfigurations to circumvent email security measures and disseminate malware. The perpetrators exploit weaknesses in the Sender Policy Framework (SPF) of roughly 20,000 web domains to achieve this. Exploiting SPF Misconfiguration Security experts at Infoblox have

FBI Employs Malware's 'Self-Delete' Tactic to Remove Chinese PlugX from U.S. Systems

FBI Neutralizes PlugX Malware Using Its Own Self-Destruct Feature In an unprecedented collaboration, the FBI and French law enforcement have successfully removed the PlugX malware from over 4,200 computers in the United States. Leveraging the malware’s innate self-delete mechanism, authorities dismantled this notorious China-linked remote access trojan (RAT)

Over 660,000 Rsync Servers at Risk: Code Execution Vulnerabilities Uncovered

New Rsync Vulnerabilities Threaten Over 660,000 Exposed Servers A series of newly identified vulnerabilities have left more than 660,000 Rsync servers at risk of remote code execution attacks, including a critical heap-buffer overflow flaw. This open-source utility, known for its efficient file synchronization and data transfer capabilities, is

Your link has expired. Please request a new one.
Your link has expired. Please request a new one.
Your link has expired. Please request a new one.
Great! You've successfully signed up.
Great! You've successfully signed up.
Welcome back! You've successfully signed in.
Success! You now have access to additional content.