Tag: Cyber Security News

Hackers Actively Compromising Databases Using Legitimate Commands

A sophisticated new breed of ransomware attacks is leveraging legitimate database commands to compromise organizations worldwide, bypassing traditional security measures through “malware-less” operations. Unlike conventional ransomware that encrypts files using malicious binaries, threat actors are exploiting exposed database services by…

New Fully Undetectable FUD Android RAT Hosted on GitHub

A sophisticated Android remote access trojan (RAT) has emerged on GitHub, presenting significant security concerns for mobile device users worldwide. The malware, publicly available under the repository “Android-RAT” by user Huckel789, claims to offer fully undetectable (FUD) capabilities that can…

PoC Exploit Released for Critical Lua Engine Vulnerabilities

Three newly disclosed vulnerabilities have been identified in the Lua scripting engine of Redis 7.4.5, each presenting severe risks of remote code execution and privilege escalation.  Redrays has released a detailed proof-of-concept (PoC) to exploit these vulnerabilities, which is now…