Security News

Researchers Find 34 Windows Drivers Vulnerable to Full Device Takeover
2023-11-02 08:59

As many as 34 unique vulnerable Windows Driver Model (WDM) and Windows Driver Frameworks (WDF) drivers could be exploited by non-privileged threat actors to gain full control of the devices and...

Researchers Expose Prolific Puma's Underground Link Shortening Service
2023-11-01 14:55

A threat actor known as Prolific Puma has been maintaining a low profile and operating an underground link shortening service that's offered to other threat actors for at least over the past four...

Researchers Uncover Wiretapping of XMPP-Based Instant Messaging Service
2023-10-28 07:20

New findings have shed light on what's said to be a lawful attempt to covertly intercept traffic originating from jabber[.]ru (aka xmpp[.]ru), an XMPP-based instant messaging service, via servers...

YoroTrooper: Researchers Warn of Kazakhstan's Stealthy Cyber Espionage Group
2023-10-26 04:25

A relatively new threat actor known as YoroTrooper is likely made of operators originating from Kazakhstan. The assessment, which comes from Cisco Talos, is based on their fluency in Kazakh and...

Researchers uncover DarkGate malware’s Vietnamese connection
2023-10-20 10:58

WithSecure researchers have tracked attacks using DarkGate malware to an active cluster of cybercriminals operating out of Vietnam. DarkGate is a remote access trojan that has been used in attacks since at least 2018 and is currently available to cybercriminals as Malware-as-a-Service.

Researchers warn of increased malware delivery via fake browser updates
2023-10-17 10:18

ClearFake, a recently documented threat leveraging compromised WordPress sites to push malicious fake browser updates, is likely operated by the threat group behind the SocGholish "Malware delivery via fake browser updates" campaigns, Sekoia researchers have concluded. Subsequently downloaded payloads create an iframe element to host the fake update interface, download that interface, and the fake update content and HTML page.

Researchers Unveil ToddyCat's New Set of Tools for Data Exfiltration
2023-10-13 11:53

The advanced persistent threat (APT) actor known as ToddyCat has been linked to a new set of malicious tools that are designed for data exfiltration, offering a deeper insight into the hacking...

Researchers Uncover Malware Posing as WordPress Caching Plugin
2023-10-12 09:16

Cybersecurity researchers have shed light on a new sophisticated strain of malware that masquerades a WordPress plugin to stealthily create administrator accounts and remotely control a...

Researchers Uncover Ongoing Attacks Targeting Asian Governments and Telecom Giants
2023-10-12 06:20

High-profile government and telecom entities in Asia have been targeted as part of an ongoing campaign since 2021 that's designed to deploy basic backdoors and loaders for delivering next-stage...

Researcher bags two-for-one deal on Linux bugs while probing GNOME component
2023-10-10 16:01

Cue files - which store the metadata that defines the layout of music on a CD. Given that it's often used alongside the FLAC audio format, open source audio players like Audacious are dependent on the library. The tracker-miners application initializes automatically when a file is either added or modified in a subdirectory of the home directory.