Category: EN

Fake PDFCandy Websites Spread Malware via Google Ads

CloudSEK uncovers a sophisticated malware campaign where attackers impersonate PDFCandy.com to distribute the ArechClient2 information stealer. Learn how… This article has been indexed from Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto Read the original article: Fake PDFCandy…

Notorious image board 4chan hacked and internal data leaked

The infamous website was taken down and working intermittently, while hackers leaked alleged data like moderators email addresses, and source code. This article has been indexed from Security News | TechCrunch Read the original article: Notorious image board 4chan hacked…

Spotting Phishing Attacks with Image Verification Techniques

An interconnected digital landscape differentiates the current era from previous ones, as using the internet for various personal and professional purposes was uncommon then. While this phenomenon has eased multiple tasks for people of different demographics, it has also resulted…

New PasivRobber Malware Steals Data From macOS Systems and Applications

A sophisticated Chinese spyware suite dubbed “PasivRobber” that targets macOS devices, with particular focus on harvesting data from communication applications popular among Chinese users.  The multi-binary malware package demonstrates advanced technical capabilities for data exfiltration and persistence. On March 13,…

Fake Microsoft Office Add-Ins Targeting Crypto Transactions

  The attackers are leveraging SourceForge to distribute fraudulent Microsoft add-ins that install malware on victims’ PCs to mine and siphon crypto. SourceForge.net is a legitimate software hosting and distribution platform that also offers version control, issue tracking, and dedicated…

RSA Conference 2025

Follow SearchSecurity’s RSAC 2025 guide for insightful pre-conference insights and reports on notable presentations and breaking news at the world’s biggest infosec event. This article has been indexed from Search Security Resources and Information from TechTarget Read the original article:…

ABB M2M Gateway

View CSAF 1. EXECUTIVE SUMMARY CVSS v4 8.8 ATTENTION: Exploitable remotely/low attack complexity Vendor: ABB Equipment: M2M Gateway Vulnerabilities: Integer Overflow or Wraparound, Inconsistent Interpretation of HTTP Requests (‘HTTP Request/Response Smuggling’), Unquoted Search Path or Element, Untrusted Search Path, Use…

Mitsubishi Electric Europe B.V. smartRTU

View CSAF 1. EXECUTIVE SUMMARY CVSS v4 9.3 ATTENTION: Exploitable remotely/low attack complexity Vendor: Mitsubishi Electric Europe B.V. Equipment: smartRTU Vulnerability: Missing Authentication for Critical Function, OS Command Injection 2. RISK EVALUATION Successful exploitation of these vulnerabilities could allow a…

Delta Electronics COMMGR

View CSAF 1. EXECUTIVE SUMMARY CVSS v4 9.3 ATTENTION: Exploitable remotely/low attack complexity Vendor: Delta Electronics Equipment: COMMGR Vulnerability: Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG) 2. RISK EVALUATION Successful exploitation of this vulnerability could allow for an attacker…

Growatt Cloud Applications

View CSAF 1. EXECUTIVE SUMMARY CVSS v4 9.3 ATTENTION: Exploitable remotely/low attack complexity Vendor: Growatt Equipment: Cloud Applications Vulnerabilities: Cross-site Scripting, Authorization Bypass Through User-Controlled Key, Insufficient Type Distinction, External Control of System or Configuration Setting 2. RISK EVALUATION Successful…

Lantronix Xport

View CSAF 1. EXECUTIVE SUMMARY CVSS v4 9.3 ATTENTION: Exploitable remotely/low attack complexity Vendor: Lantronix Equipment: Xport Vulnerability: Missing Authentication for Critical Function 2. RISK EVALUATION Successful exploitation of this vulnerability could allow an attacker unauthorized access to the configuration…

Slopsquatting

As AI coding assistants invent nonexistent software libraries to download and use, enterprising attackers create and upload libraries with those names—laced with malware, of course. This article has been indexed from Schneier on Security Read the original article: Slopsquatting

MITRE Impact Report 2024: Strengthening Threat-Informed Defenses

To mark the organization’s fifth anniversary, MITRE’s Center for Threat-Informed Defense published its 2024 Impact Report, which details the organization’s 40 open-source research projects and how they benefit the cybersecurity community. This is a closer look at three of those…