Category: Attack

SystemBC Malware’s C2 Server Analysis Exposes Payload Delivery Tricks

[ad_1] Jan 25, 2024NewsroomRemote Access Trojan Cybersecurity researchers have shed light on the command-and-control (C2)…

LODEINFO Fileless Malware Evolves with Anti-Analysis and Remote Code Tricks

[ad_1] Jan 25, 2024NewsroomFileless Malware / Endpoint Security Cybersecurity researchers have uncovered an updated version…

Critical Jenkins Vulnerability Exposes Servers to RCE Attacks

[ad_1] Jan 25, 2024NewsroomVulnerability / Software Security The maintainers of the open-source continuous integration/continuous delivery…

7 Key Findings and Upcoming Trends for 2024

[ad_1] The 2023/2024 Axur Threat Landscape Report provides a comprehensive analysis of the latest cyber…

China-backed Hackers Hijack Software Updates to Implant “NSPX30” Spyware

[ad_1] A previously undocumented China-aligned threat actor has been linked to a set of adversary-in-the-middle…

New CherryLoader Malware Mimics CherryTree to Deploy PrivEsc Exploits

[ad_1] Jan 25, 2024NewsroomThreat Intelligence / Malware Research A new Go-based malware loader called CherryLoader…

Tech Giant HP Enterprise Hacked by Russian Hackers Linked to DNC Breach

[ad_1] Jan 25, 2024NewsroomCyber Attack / Data Breach Hackers with links to the Kremlin are…

Google Kubernetes Misconfig Lets Any Gmail Account Control Your Clusters

[ad_1] Jan 24, 2024NewsroomCloud Security / Kubernetes Cybersecurity researchers have discovered a loophole impacting Google…

Kasseika Ransomware Using BYOVD Trick to Disarms Security Pre-Encryption

[ad_1] The ransomware group known as Kasseika has become the latest to leverage the Bring…

What is Nudge Security and How Does it Work?

[ad_1] Jan 24, 2024The Hacker NewsSaaS Security / Endpoint Security In today's highly distributed workplace,…