Bitter APT Targets Turkish Defense Sector Using WmRAT and MiyaRAT Malware: The Bitter APT group has emerged as a persistent cyber-espionage threat, recently targeting the Turkish defense sector…
News
-
-
News
CoinLurker Malware Threats: A New Era of Fake Updates and Malware Threats
by Clement Brako Akomea 2 minutes readThe cyber threat landscape has evolved, and a new player called CoinLurker is leading the charge in fake update campaigns. CoinLurker, a sophisticated stealer, combines advanced malware techniques…
-
NewsRansomware
The Mask APT Malware Campaign Resurfaces with Sophisticated Multi-Platform Malware Arsenal
by Penelope Iroko 2 minutes readCybersecurity threats are evolving, and “The Mask APT Malware Campaign” is one of the most sophisticated examples of modern cyber espionage. Known for targeting high-profile organizations, The Mask…
-
The Windows kernel bug exploited by attackers has sparked widespread concern due to its potential to grant SYSTEM-level privileges. Tracked as CVE-2024-35250, this high-severity vulnerability affects the Microsoft…
-
NewsVulnerabilities
CISA and FBI Warn About Exploited Flaws and HiatusRAT Campaign
by CSC Newsby CSC News 2 minutes readThe exploited flaws and HiatusRAT campaign have triggered heightened alerts from CISA and the FBI, urging organizations to act quickly. These vulnerabilities pose significant threats, with active exploitation…
-
NewsRansomware
Cleo Ransomware Vulnerability Exploited by Cl0p Group: What You Need to Know
by Penelope Iroko 2 minutes readThe Cleo ransomware vulnerability exploited by the notorious Cl0p group has raised alarms across the cybersecurity community, revealing critical flaws in Cleo’s Harmony, VLTrader, and LexiCom tools. This…
-
NewsVulnerabilities
Undocumented DrayTek Vulnerabilities Used in Ransomware Attacks
by CSC Newsby CSC News 2 minutes readThe exploitation of undocumented DrayTek vulnerabilities has emerged as a serious cybersecurity threat, compromising over 300 organizations worldwide. Cybercriminals have leveraged these flaws, including a potential zero-day vulnerability,…
-
NewsApplication Security
DeceptionAds: Fake Captchas Spread Infostealer Malware
by Clement Brako Akomea 4 minutes readFake Captchas are spreading malware through a deceptive tactic called “DeceptionAds,” exposing unsuspecting users to serious cybersecurity risks. These fraudulent ads, disguised as legitimate CAPTCHA verification requests, lure…
-
NewsData Breaches
ConnectOnCall Data Breach Exposes Health Records of 910,000 Patients
by Clement Brako Akomea 2 minutes readThe recent ConnectOnCall data breach has raised significant concerns about patient privacy and the security of healthcare communications. This breach, impacting over 910,000 patients, compromised sensitive personal and…
-
News
New AI Investment Scam Exploits Social Media to Target Victims
by Clement Brako Akomea 2 minutes readA new AI investment scam is making waves, targeting unsuspecting victims through fake social media ads and deceptive tactics. This scam combines artificial intelligence (AI), fake celebrity endorsements,…