Avast researchers have identified a cryptographic weakness in the DoNex ransomware and its previous versions, enabling them to create a decryptor for files encrypted by these variants. This article has been indexed from Cyware News – Latest Cyber News Read…
Category: Cyware News – Latest Cyber News
New Variation of WordFence Evasion Malware Discovered
A new variation of WordFence evasion malware has been discovered, concealing backdoors in infected WordPress environments. A suspicious plugin named “wp-engine-fast-action” was found tampering with the popular WordFence security plugin. This article has been indexed from Cyware News – Latest…
Vinted Fined $2.6m Over Data Protection Failure
Vinted, a prominent online platform for second-hand sales, has been fined €2,385,276 ($2,582,730) for violating the EU’s General Data Protection Regulation (GDPR) by not properly handling personal data deletion requests. This article has been indexed from Cyware News – Latest…
Gogs Vulnerabilities May Put Your Source Code at Risk
Exploiting these flaws could allow attackers to execute arbitrary commands, read source code, and gain unauthorized access. The vulnerabilities require authentication, with one flaw specifically requiring the built-in SSH server to be enabled. This article has been indexed from Cyware…
Report: 47% of Corporate Data Stored in the Cloud Is Sensitive
Cloud resources are increasingly targeted by cyberattacks, with SaaS applications, cloud storage, and cloud management infrastructure being the top categories of attack, according to Thales. This article has been indexed from Cyware News – Latest Cyber News Read the original…
Report: 99% of IoT Exploitation Attempts Rely on Previously Known CVEs
The expanding attack surface, with over 15 billion connected devices worldwide, raises concerns about privacy breaches for users. The average home now has 21 connected devices, facing more than 10 daily cyberattacks. This article has been indexed from Cyware News…
GootLoader is Still Active and Efficient
The malware has evolved into multiple versions, with GootLoader 3 being the latest one in use. Despite updates to the payload, the infection strategies have remained consistent since its resurgence in 2020. This article has been indexed from Cyware News…
Infostealing Malware Masquerading as Generative AI Tools
Information-stealing malware families have evolved to impersonate generative AI tools, with examples like GoldPickaxe stealing facial recognition data for deepfake videos. This article has been indexed from Cyware News – Latest Cyber News Read the original article: Infostealing Malware Masquerading…
Pro-Bangladeshi Hacktivists Enter Global Stage with Matryoshka 424 Alliance
Team ARXU gained recognition earlier this year for targeting Romania over its support for Israel. The hacker group has a history of cyberattacks against Israel and its allies. This article has been indexed from Cyware News – Latest Cyber News…
Latest Ghostscript Vulnerability Haunts Experts as the Next Big Breach Enabler
The vulnerability could be exploited to compromise systems without requiring user interaction, contrary to some severity assessments initially made by Tenable and Red Hat. This article has been indexed from Cyware News – Latest Cyber News Read the original article:…
Traeger Security Bugs Threatening Grillers’ Hard Work
Traeger grills face security bugs that could spell trouble for BBQ enthusiasts. High-severity vulnerabilities in the Traeger Grill D2 Wi-Fi Controller could allow remote attackers to control the grill’s temperature or shut it down. This article has been indexed from…
New Eldorado Ransomware Targets Windows, VMware ESXi VMs
Eldorado also encrypts network shares using the SMB protocol, deletes shadow volume copies, and skips certain file types to prevent system damage. Affiliates can customize attacks on Windows, while Linux customization is limited. This article has been indexed from Cyware…
Passkey Redaction Attacks Subvert GitHub, Microsoft Authentication
Online accounts are increasingly protected by passkey technology, but many platforms like banking, e-commerce, social media, and software development can still be compromised using adversary-in-the-middle (AitM) attacks. This article has been indexed from Cyware News – Latest Cyber News Read…
New Golang Zergeca Botnet appeared in the threat landscape
The researchers at QiAnXin XLab team discovered a new Golang-based botnet called Zergeca, capable of conducting DDoS attacks. It was detected through a suspicious ELF file and has been used to launch DDoS attacks in Canada, the U.S., and Germany.…
Malicious QR Reader App in Google Play Delivers Anatsa Banking Malware
A malicious QR code reader app on Google Play has been found distributing the Anatsa banking malware, posing a significant threat to users’ financial data. The app has already been downloaded thousands of times. This article has been indexed from…
Turla: A Master of Deception
The Turla malware has been found using weaponized LNK files to infect computers. The malware leverages a compromised website to distribute malicious packages through phishing emails. This article has been indexed from Cyware News – Latest Cyber News Read the…
Hackers attack HFS servers to drop malware and Monero miners
Hackers are targeting older versions of the HTTP File Server from Rejetto to drop malware and cryptocurrency mining software by exploiting a critical vulnerability (CVE-2024-23692) that allows executing arbitrary commands without authentication. This article has been indexed from Cyware News…
OVHcloud blames record-breaking DDoS attack on MikroTik botnet
OVHcloud successfully mitigated a record-breaking DDoS attack with a packet rate of 840 million packets per second. The attack originated from compromised MikroTik network devices, which were used to generate high packet rates. This article has been indexed from Cyware…
384,000 sites pull code from sketchy code library recently bought by Chinese firm
Over 384,000 websites, including those of major companies and government entities, are still linking to the polyfill[.]io code library that was recently acquired by a Chinese firm and used to perform a supply chain attack. This article has been indexed…
Hackers abused API to verify millions of Authy MFA phone numbers
Twilio has confirmed that an unsecured API endpoint allowed threat actors to access phone numbers of millions of Authy multi-factor authentication users, potentially making them vulnerable to SMS phishing and SIM swapping attacks. This article has been indexed from Cyware…