Description A newly identified attack campaign by the Chinese cyber-espionage group Evasive Panda (DaggerFly) involves the hijacking of the SSH daemon . . . Read more
Description Process Hollowing is a code injection technique commonly employed by malware to evade detection. It involves creating a legitimate proces . . . Read more
Description A phishing campaign has been identified, targeting Microsoft advertisers through malicious Google Ads. Attackers are leveraging sponsored . . . Read more
Description A newly discovered ChatGPT jailbreak, dubbed Time Bandit, enables users to bypass OpenAI’s safety measures and gain access to restr . . . Read more
Description Rockstar 2FA is a new phishing-as-a-service (PhaaS) platform facilitating adversary-in-the-middle (AiTM) attacks to compromise Microsoft 3 . . . Read more
Description BootKitty is a newly identified UEFI (Unified Extensible Firmware Interface) bootkit targeting Linux systems, exploiting a firmware vulner . . . Read more
Description Cybercriminals have leveraged the popular open-source Godot game engine to distribute malware through a new tool called GodLoader. This ma . . . Read more
Description GhostSpider is a sophisticated backdoor malware employed by the Salt Typhoon hacking group, also known as Earth Estries or UNC2286. This g . . . Read more
Description Hackers have exploited two recently patched zero-day vulnerabilities in Palo Alto Networks PAN-OS software, compromising over 2,000 firewa . . . Read more
Description MITRE has released the 2024 list of the 25 most dangerous and commonly exploited software weaknesses, based on a review of over 31,000 vul . . . Read more
Description WordPress websites are increasingly being targeted by threat actors who install malicious plugins that push information-stealing malware t . . . Read more
Description D-Link has issued a warning regarding four Remote Code Execution (RCE) vulnerabilities affecting all hardware and firmware versions of i . . . Read more