Malware & Threats
In 2023, Google said it blocked 2.28 million bad applications from being published on Google Play and banned 333,000 developer accounts.
Hi, what are you looking for?
Researchers identify a previously unknown ClickFix variant exploiting PowerShell and clipboard hijacking to deliver the Lumma infostealer via a compromised travel site.
In 2023, Google said it blocked 2.28 million bad applications from being published on Google Play and banned 333,000 developer accounts.
US healthcare giant is warning millions of current and former patients that their personal information was exposed to third-party advertisers.
A new Android trojan named Brokewell can steal user’s sensitive information and allows attackers to take over devices.
More than 1,400 CrushFTP servers remain vulnerable to an actively exploited zero-day for which PoC has been published.
More than 90,000 unique IPs are still infected with a PlugX worm variant that spreads via infected flash drives.
A North Korea-linked threat actor hijacked the update mechanism of eScan antivirus to deploy backdoors and cryptocurrency miners.
A threat actor tracked as CoralRaider has been using multiple infostealers to harvest credentials from users worldwide.
Russia-linked APT28 deploys the GooseEgg post-exploitation tool against numerous US and European organizations.
Shadowserver has identified roughly 6,000 internet-accessible Palo Alto Networks firewalls potentially vulnerable to CVE-2024-3400.
VulnCheck banks $8 million in early stage capital to build 'exploit intelligence' technologies and services.
Noteworthy stories that might have slipped under the radar: OpenSSF and OpenJS incidents similar to XZ backdoor, Moldovan botnet operator charged, US automotive company...
Microsoft warns that several OpenMetadata vulnerabilities are being exploited to deploy cryptomining malware to Kubernetes environments.
Kapeka is a new backdoor that may be a new addition to Russia-link Sandworm’s malware arsenal and possibly a successor to GreyEnergy.
Cisco has observed an increase in brute-force attacks targeting web application authentication, VPNs, and SSH services.
Palo Alto Networks firewall vulnerability CVE-2024-3400 increasingly exploited after PoC code has been released.
Palo Alto Networks has started releasing hotfixes for the firewall zero-day CVE-2024-3400, which some have linked to North Korea’s Lazarus.
A state-sponsored threat actor has been exploiting a zero-day in Palo Alto Networks firewalls for the past two weeks.
Checkmarx warns of a new attack relying on GitHub search manipulation to deliver malicious code.
CISA's Malware Next-Gen system is now available for any organization to submit malware samples and other suspicious artifacts for analysis.
Microsoft patches CVE-2024-29988 and CVE-2024-26234, two zero-day vulnerabilities exploited by threat actors to deliver malware.