Infected NuGet Packages Unearthed Distributing the SeroXen Remote Administration Tool
October 31, 2023
Within the realm of information security, diligent researchers have unveiled a fresh wave of malicious packages distributed via the NuGet package manager. These packages employ a less recognized…
0 Comments4 Minutes
Hackers Infecting Windows PCs with GHOSTPULSE via MSIX App Packages
October 30, 2023
A recently unveiled cyber assault campaign has uncovered a new threat in the form of GHOSTPULSE, a novel malware loader. This threat is spreading by mimicking MSIX Windows program package files of…
0 Comments4 Minutes
VMware Releases Critical Patch for Remote Code Execution Vulnerability in vCenter Server
October 26, 2023
VMware has taken swift action to address a critical vulnerability in the vCenter Server that could potentially lead to remote code execution on vulnerable systems. The discovery of this flaw was made…
0 Comments3 Minutes
Critical Flaws Discovered in OAuth Platforms: Grammarly, Vidio, and Bukalapak
October 26, 2023
The Open Authorization (OAuth) implementation in well-known web services, such as Grammarly, Vidio, and Bukalapak, has come under scrutiny due to critical security issues. These vulnerabilities…
0 Comments4 Minutes
Cisco’s Discovery: A Second Zero-Day Vulnerability Despite the Decline in Hacked Devices
October 25, 2023
Cisco, a cybersecurity industry leader, recently brought a troubling revelation to light—an additional zero-day vulnerability actively exploited in IOS XE. This discovery occurs alongside a…
0 Comments6 Minutes
Lazarus Group Is Going After Defense Experts Using Bogus Interviews Conducted Through Trojanized VNC Apps.
October 18, 2023
As part of a long-running campaign known as Operation Dream Job, the Lazarus Group which has ties to North Korea and is also known as Hidden Cobra or TEMP. Hermit has been seen employing trojanized…
0 Comments6 Minutes
Be Cautious of SpyNote, an Android Trojan That Records Both Audio and Phone Calls
October 17, 2023
The Android banking trojan known as SpyNote has been deconstructed, revealing its multifaceted information-gathering capabilities. According to F-Secure, the attack chains that deploy this spyware…
0 Comments4 Minutes
Pro-Russian Hackers Exploiting New WinRAR Vulnerability in Phishing Campaign
October 16, 2023
In a targeted phishing campaign designed to extract sensitive credentials from compromised computers, pro-Russian hacking groups have leveraged a recently identified security flaw in the WinRAR…
0 Comments6 Minutes
Cisco Issues Urgent Patch to Address Critical Flaw in Emergency Responder Systems
October 12, 2023
Cisco has swiftly taken action to mitigate a significant security vulnerability impacting Emergency Responder systems. This flaw has the potential to be exploited by remote, unauthenticated…
0 Comments3 Minutes
BMC Firmware in Supermicro Reveals Multiple Critical Vulnerabilities
October 12, 2023
Recently, it was uncovered that Supermicro’s BMC firmware harbours numerous critical vulnerabilities. Security researchers have identified multiple flaws within the Intelligent Platform…
0 Comments6 Minutes