Security News

New Ymir Ransomware Exploits Memory for Stealthy Attacks; Targets Corporate Networks
2024-11-12 06:00

Cybersecurity researchers have flagged a new ransomware family called Ymir that was deployed in an attack two days after systems were compromised by a stealer malware called RustyStealer. "Ymir...

Cybercriminals Use Excel Exploit to Spread Fileless Remcos RAT Malware
2024-11-11 06:13

Cybersecurity researchers have discovered a new phishing campaign that spreads a new fileless variant of known commercial malware called Remcos RAT. Remcos RAT "provides purchases with a wide...

SteelFox and Rhadamanthys Malware Use Copyright Scams, Driver Exploits to Target Victims
2024-11-07 09:42

An ongoing phishing campaign is employing copyright infringement-related themes to trick victims into downloading a newer version of the Rhadamanthys information stealer since July 2024....

VEILDrive Attack Exploits Microsoft Services to Evade Detection and Distribute Malware
2024-11-06 17:52

An ongoing threat campaign dubbed VEILDrive has been observed taking advantage of legitimate services from Microsoft, including Teams, SharePoint, Quick Assist, and OneDrive, as part of its modus...

Cast a hex on ChatGPT to trick the AI into writing exploit code
2024-10-29 22:30

'It was like watching a robot going rogue' says researcher OpenAI's language model GPT-4o can be tricked into writing exploit code by encoding the malicious instructions in hexadecimal, which...

Adversarial groups adapt to exploit systems in new ways
2024-10-28 04:30

In this Help Net Security video, Jake King, Head of Threat & Security Intelligence at Elastic, discusses the key findings from the 2024 Elastic Global Threat Report. Adversaries are utilizing...

Emergency patch: Cisco fixes bug under exploit in brute-force attacks
2024-10-24 18:15

Who doesn't love abusing buggy appliances, really? Cisco has patched an already exploited security hole in its Adaptive Security Appliance (ASA) and Firepower Threat Defense (FTD) software that...

Lazarus Group Exploits Google Chrome Vulnerability to Control Infected Devices
2024-10-24 09:53

The North Korean threat actor known as Lazarus Group has been attributed to the zero-day exploitation of a now-patched security flaw in Google Chrome to seize control of infected devices....

Microsoft SharePoint RCE flaw exploits in the wild – you've had 3 months to patch
2024-10-23 19:30

Plus, a POC to make it extra easy for attackers A Microsoft SharePoint bug that can allow an attacker to remotely inject code into vulnerable versions is under active exploitation, according to...

Lazarus hackers used fake DeFi game to exploit Google Chrome zero-day
2024-10-23 18:03

The North Korean Lazarus hacking group exploited a Google Chrome zero-day tracked as CVE-2024-4947 through a fake decentralized finance (DeFi) game targeting individuals in the cryptocurrency space. [...]