Adobe ColdFusion Critical Flaw Added to CISA’s Exploited Catalog: The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has included a critical security vulnerability found in Adobe ColdFusion in …
News
-
-
New XLoader macOS Malware Disguised as ‘OfficeNote’ App: A fresh variant of the macOS-targeting XLoader malware has emerged, camouflaging itself as the legitimate ‘OfficeNote’ productivity app. This devious …
-
News
New P2PInfect Worm Targets Redis Servers with Undocumented Breach Methods
by CSC Newsby CSC News 2 minutes readNew P2PInfect Worm Targets Redis Servers with Undocumented Breach Methods: The P2PInfect worm, a peer-to-peer malware, is employing undisclosed initial access methods to infiltrate vulnerable Redis servers, forming …
-
News
Patchwork Hackers Target Chinese Research Organizations with EyeShell Backdoor
by CSC Newsby CSC News 2 minutes readPatchwork Hackers Target Chinese Research Organizations with EyeShell Backdoor: Threat actors belonging to the Patchwork hacking crew have launched a targeted campaign against Chinese universities and research organizations, …
-
A new malware, Android Malware CherryBlos, employs optical character recognition (OCR) techniques to pilfer sensitive data stored in images (OCR-Powered Data Theft). Disguised in fake social media posts, …
-
News
AVRecon Botnet Exploits Compromised Routers for Illegal Proxy Services
by CSC Newsby CSC News 3 minutes readAVRecon Botnet Exploits Compromised Routers for Illegal Proxy Services: The AVRecon botnet has raised security concerns as it utilizes compromised small office/home office (SOHO) routers in a long-running …
-
News
Ninja Forms Plugin Vulnerabilities Leave 800k Sites Exposed
by CSC Newsby CSC News 2 minutes readNinja Forms Plugin Vulnerabilities Leave 800k Sites Exposed: Security researchers have uncovered critical flaws in the popular Ninja Forms plugin for WordPress, potentially exposing over 800,000 sites to …
-
Fruity Trojan Spreads Remcos RAT via Deceptive Software: A dangerous cyber threat is on the rise as threat actors employ deceptive tactics, creating fake websites hosting trojanized software …
-
News
Norway Discloses Zero-Day Exploitation in Government IT Systems
by CSC Newsby CSC News 2 minutes readNorway Discloses Zero-Day Exploitation in Government IT Systems: Norway’s government IT systems faced a significant security breach as attackers exploited a zero-day vulnerability in Ivanti’s Endpoint Manager Mobile …
-
News
Massive Info-Stealing Malware Breach: 400,000 Corporate Credentials Stolen
by CSC Newsby CSC News 2 minutes readMassive Info-Stealing Malware Breach: 400,000 Corporate Credentials Stolen: In the ever-evolving landscape of cyber threats, a shocking discovery has emerged – over 400,000 corporate credentials stolen by info-stealing …