Description Rockstar 2FA is a new phishing-as-a-service (PhaaS) platform facilitating adversary-in-the-middle (AiTM) attacks to compromise Microsoft 3 . . . Read more
Description BootKitty is a newly identified UEFI (Unified Extensible Firmware Interface) bootkit targeting Linux systems, exploiting a firmware vulner . . . Read more
Description Cybercriminals have leveraged the popular open-source Godot game engine to distribute malware through a new tool called GodLoader. This ma . . . Read more
Description GhostSpider is a sophisticated backdoor malware employed by the Salt Typhoon hacking group, also known as Earth Estries or UNC2286. This g . . . Read more
Description Hackers have exploited two recently patched zero-day vulnerabilities in Palo Alto Networks PAN-OS software, compromising over 2,000 firewa . . . Read more
Description MITRE has released the 2024 list of the 25 most dangerous and commonly exploited software weaknesses, based on a review of over 31,000 vul . . . Read more
Description WordPress websites are increasingly being targeted by threat actors who install malicious plugins that push information-stealing malware t . . . Read more
Description D-Link has issued a warning regarding four Remote Code Execution (RCE) vulnerabilities affecting all hardware and firmware versions of i . . . Read more
Description Cicada3301 is a new ransomware group that targets Windows and Linux systems, especially VMware ESXi environments. They use double-extorti . . . Read more
Description A new type of cyberattack using a less common technique called AppDomain Manager Injection has been targeting government agencies in Taiw . . . Read more
Description Hackers have begun exploiting a critical vulnerability in the LiteSpeed Cache plugin, a popular tool used by WordPress websites to enhance . . . Read more
Description Threat actors have started leveraging progressive web applications (PWAs) to impersonate banking apps and steal credentials from both Andr . . . Read more