Content Paint

Intel

Exploits for Firefox and Windows zero-days in use by Russian RomCom Hackers

The Russian cybercrime group known as RomCom has recently launched attacks using two zero-day vulnerabilities affecting Firefox and Tor Browser users in Europe and North America. These attacks were meticulously crafted to target specific industries, exploiting security flaws to gain unauthorized access to systems. Firefox Zero-Day (CVE-2024-9680) This vulnerability, identified

Hackers exploiting critical bug in Array Networks SSL VPN products

Critical Vulnerability Exploited in Array Networks SSL VPN Products Hackers have been found exploiting a critical vulnerability in Array Networks' SSL VPN products, as confirmed by the U.S. Cybersecurity and Infrastructure Security Agency (CISA). This vulnerability, identified as CVE-2023-28461, affects both Array AG Series hardware and vxAG virtual

PyPI Python Library "aiocpa" Found Exfiltrating Crypto Keys via Telegram Bot

The Python Package Index (PyPI) maintainers have quarantined the "aiocpa" library after discovering its latest update contained malicious code designed to steal private keys through a Telegram bot. Package Details "aiocpa" is recognized as a synchronous and asynchronous Crypto Pay API client, with its initial release

Hackers abuse Avast anti-rootkit driver to disable defenses

Recent findings reveal that cybercriminals are exploiting an outdated Avast Anti-Rootkit driver to bypass security systems by disabling critical defense mechanisms. This approach allows threat actors to gain control of targeted computers, putting sensitive data and systems at risk. Malware Tactics The attack utilizes a variant of an AV Killer,

North Korean Hackers Steal $10M with AI-Driven Scams and Malware on LinkedIn

Researchers from Microsoft have uncovered that a North Korean hacking group, known as Sapphire Sleet, has pilfered over $10 million in cryptocurrency through an elaborate LinkedIn-driven social engineering scheme. Over six months, operatives associated with the hermit nation executed operations leveraging fake LinkedIn profiles while pretending to be both recruiters

Hackers breach US firm over Wi-Fi from Russia in 'Nearest Neighbor Attack'

Russian APT28 Hackers Exploit US Company Wi-Fi from Afar In a remarkable demonstration of their capabilities, Russian cyber espionage group APT28, also known as Fancy Bear and linked to Russia's military intelligence agency GRU, successfully infiltrated a U.S. company's Wi-Fi network from a distant location.

Malware Bypasses Microsoft Defender and 2FA to Steal $24K in Crypto

Fake NFT App Exploits Defender and 2FA, Draining $24K in Cryptocurrency In a recent cybersecurity incident, crafty malware managed to bypass Microsoft Defender and two-factor authentication (2FA), leading to the theft of $24,000 in cryptocurrency. The breach was facilitated through a fake NFT game application, according to findings by

Linux Malware WolfsBane and FireWood Linked to Gelsemium APT

New Linux Threats Two newly identified malware strains, WolfsBane and FireWood, have been detected targeting Linux systems, as revealed in recent research by cybersecurity firm ESET. These sophisticated tools have been linked to the Gelsemium Advanced Persistent Threat (APT) group, known for cyber espionage activities in sectors such as government,

Leaked Documents Show What Phones Secretive Tech ‘Graykey’ Can Unlock

A recent leak reveals detailed insights into the capabilities of Graykey, a forensic tool widely utilized by law enforcement to unlock smartphones. According to documents acquired by 404 Media, Graykey can only partially access data on Apple's latest iPhone models running iOS 18 or iOS 18.0.1.

Your link has expired. Please request a new one.
Your link has expired. Please request a new one.
Your link has expired. Please request a new one.
Great! You've successfully signed up.
Great! You've successfully signed up.
Welcome back! You've successfully signed in.
Success! You now have access to additional content.