Category: Attack

U.S. Feds Shut Down China-Linked “KV-Botnet” Targeting SOHO Routers

[ad_1] The U.S. government on Wednesday said it took steps to neutralize a botnet comprising…

HeadCrab 2.0 Goes Fileless, Targeting Redis Servers for Crypto Mining

[ad_1] Feb 01, 2024NewsroomCryptocurrency / Botnet Cybersecurity researchers have detailed an updated version of the…

New Malware Emerges in Attacks Exploiting Ivanti VPN Vulnerabilities

[ad_1] Feb 01, 2024NewsroomNetwork Security / Malware Google-owned Mandiant said it identified new malware employed…

CISA Warns of Active Exploitation of Critical Vulnerability in iOS, iPadOS, and macOS

[ad_1] Feb 01, 2024NewsroomVulnerability / Software Update The U.S. Cybersecurity and Infrastructure Security Agency (CISA)…

RunC Flaws Enable Container Escapes, Granting Attackers Host Access

[ad_1] Jan 31, 2024NewsroomSoftware Security / Linux Multiple security vulnerabilities have been disclosed in the…

Ivanti Discloses 2 New Zero-Day Flaws, One Under Active Exploitation

[ad_1] Jan 31, 2024NewsroomVulnerability / Zero Day Ivanti is alerting of two new high-severity flaws…

Telegram Marketplaces Fuel Phishing Attacks with Easy-to-Use Kits and Malware

[ad_1] Jan 31, 2024NewsroomCyber Crime / Hacking News Cybersecurity researchers are calling attention to the…

Understanding New SaaS Cybersecurity Rules

[ad_1] The SEC isn't giving SaaS a free pass. Applicable public companies, known as "registrants,"…

Italian Businesses Hit by Weaponized USBs Spreading Cryptojacking Malware

[ad_1] Jan 31, 2024NewsroomCryptocurrency / Cybersecurity A financially motivated threat actor known as UNC4990 is…

Chinese Hackers Exploiting VPN Flaws to Deploy KrustyLoader Malware

[ad_1] Jan 31, 2024NewsroomCyber Attack / Network Security A pair of recently disclosed zero-day flaws…