Category: EN

New ACRStealer Abuses Google Docs and Steam for C2 Server Via DDR Technique

A sophisticated new variant of the ACRStealer information-stealing malware has emerged, demonstrating advanced evasion techniques and leveraging legitimate platforms for covert command-and-control operations. The malware, which has been actively distributed since early 2024, represents a significant evolution in cybercriminal tactics…

Active Campaign Exploits Cloud Flaws for Cryptomining

Wiz believes the active campaign is part of a broader crypto-scam infrastructure, which uses a wide range of exploitation techniques This article has been indexed from www.infosecurity-magazine.com Read the original article: Active Campaign Exploits Cloud Flaws for Cryptomining

Weidmueller Industrial Routers Exposed to Remote Code Execution Flaws

Multiple high-severity security vulnerabilities have been discovered in Weidmueller Industrial Routers, potentially allowing attackers to execute arbitrary code with root privileges on affected devices. The German industrial automation company has released security patches to address five critical flaws affecting its…

How the EU Is Fighting Back Against Deepfakes

Deepfakes have now crossed the line from science fiction to reality. These AI-generated audio and video forgeries are becoming more believable and increasingly dangerous. From political smear campaigns and celebrity impersonations to scams targeting businesses and individuals, deepfakes have the…

Key Operator of World’s Largest XSS Dark Web Platform Detained

International law enforcement agencies have dismantled one of the world’s most influential Russian-speaking cybercrime platforms following the arrest of its suspected administrator in a coordinated operation spanning France, Ukraine, and broader European cooperation. The takedown of xss.is represents a significant…