Category: Attack

Hackers Target macOS Users with Malicious Ads Spreading Stealer Malware

[ad_1] Malicious ads and bogus websites are acting as a conduit to deliver two different…

Urgent: Secret Backdoor Found in XZ Utils Library, Impacts Major Linux Distros

[ad_1] RedHat on Friday released an "urgent security alert" warning that two versions of a…

Dormakaba Locks Used in Millions of Hotel Rooms Could Be Cracked in Seconds

[ad_1] Security vulnerabilities discovered in Dormakaba's Saflok electronic RFID locks used in hotels could be…

TheMoon Botnet Resurfaces, Exploiting EoL Devices to Power Criminal Proxy

[ad_1] A botnet previously considered to be rendered inert has been observed enslaving end-of-life (EoL)…

The Golden Age of Automated Penetration Testing is Here

[ad_1] Network penetration testing plays a vital role in detecting vulnerabilities that can be exploited.…

New Linux Bug Could Lead to User Password Leaks and Clipboard Hijacking

[ad_1] Details have emerged about a vulnerability impacting the "wall" command of the util-linux package…

PyPI Halts Sign-Ups Amid Surge of Malicious Package Uploads Targeting Developers

[ad_1] The maintainers of the Python Package Index (PyPI) repository briefly suspended new user sign-ups…

Linux Version of DinodasRAT Spotted in Cyber Attacks Across Several Countries

[ad_1] A Linux version of a multi-platform backdoor called DinodasRAT has been detected in the wild targeting…

Finland Blames Chinese Hacking Group APT31 for Parliament Cyber Attack

[ad_1] The Police of Finland (aka Poliisi) has formally accused a Chinese nation-state actor tracked…

Darcula Phishing Network Leveraging RCS and iMessage to Evade Detection

[ad_1] A sophisticated phishing-as-a-service (PhaaS) platform called Darcula has set its sights on organizations in over 100…