Tag: EN

GootLoader is still active and efficient

Researchers warn that the malware GootLoader is still active and threat actors are still using it in their campaigns. Threat actors continue to use GootLoader malware in their campaigns, Cybereason researchers warn. The malware has evolved, resulting in several versions, with…

Hackers Attack HFS Servers to Install Malware and Mine Monero

  Cybersecurity researchers have identified a wave of attacks targeting outdated versions of the HTTP File Server (HFS) software from Rejetto, aiming to distribute malware and cryptocurrency mining tools. These attacks exploit a critical security flaw known as CVE-2024-23692, which…

Researchers Discover Cache of Billion Stolen Passwords

Researchers claim to have uncovered what they claim is the biggest cache of stolen credentials ever found. The post Researchers Discover Cache of Billion Stolen Passwords appeared first on Security Boulevard. This article has been indexed from Security Boulevard Read…

New Mallox Ransomware Variant Targets Linux Systems

New variant of Mallox ransomware targets Linux systems using custom encryption and a builder web panel. Cybersecurity researchers… This article has been indexed from Hackread – Latest Cybersecurity, Tech, Crypto & Hacking News Read the original article: New Mallox Ransomware…

The Problem With Bug Bounties

A Technically Skilled individual who finds a bug faces an ethical decision: report the bug or profit from it. This is nowhere more relevant than in crypto. In this article, with the help of Ilan Abitbol from Resonance Security, I look at the…

Traeger Security Bugs Threatening Grillers’ Hard Work

Traeger grills face security bugs that could spell trouble for BBQ enthusiasts. High-severity vulnerabilities in the Traeger Grill D2 Wi-Fi Controller could allow remote attackers to control the grill’s temperature or shut it down. This article has been indexed from…

New Eldorado Ransomware Targets Windows, VMware ESXi VMs

Eldorado also encrypts network shares using the SMB protocol, deletes shadow volume copies, and skips certain file types to prevent system damage. Affiliates can customize attacks on Windows, while Linux customization is limited. This article has been indexed from Cyware…

Passkey Redaction Attacks Subvert GitHub, Microsoft Authentication

Online accounts are increasingly protected by passkey technology, but many platforms like banking, e-commerce, social media, and software development can still be compromised using adversary-in-the-middle (AitM) attacks. This article has been indexed from Cyware News – Latest Cyber News Read…