Security Bulletin
26 Aug 2024
Biztonsági szemle
Novel PEAKLIGHT malware dropper distributed via pirated movies
Attacks commenced with the download of malicious ZIP files purporting to be pirated movies that contain an LNK file, which links with a memory-only JavaScript dropper-hosting content delivery network to execute PEAKLIGHT, according to an analysis...
26 Aug 2024
Biztonsági szemle
APT42-linked WhatsApp accounts aimed at US elections disrupted
Attacks involved the utilization of accounts spoofing Microsoft, Google, Yahoo, and AOL IT support to target other WhatsApp accounts belonging to individuals in the U.S., Iran, Israel, Palestine, and the UK, according to Meta researchers.
26 Aug 2024
Biztonsági szemle
News Desk 2024: Hacking Microsoft Copilot Is Scary Easy
As enterprises in the world embrace Microsoft's AI assistant, researcher Michael Bargury warns its security is lacking. Check out his News Desk interview during Black Hat USA.
26 Aug 2024
Biztonsági szemle
CISA Adds One Known Exploited Vulnerability to Catalog
CISA has added one new vulnerability to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. CVE-2024-7971 Google Chromium V8 Type Confusion Vulnerability These types of vulnerabilities are frequent attack vectors...
26 Aug 2024
Biztonsági szemle
Why the 80-20 rule no longer works for cybersecurity
The promise of AI is that it will let security teams run continuous monitoring on 100% of the company’s assets, so the 80-20 rule no longer applies.
26 Aug 2024
Biztonsági szemle
From Highly Obfuscated Batch File to XWorm and Redline, (Mon, Aug 26th)
If you follow my diaries, you probably already know that one of my favorite topics around malware is obfuscation. I'm often impressed by the crazy techniques attackers use to make reverse engineers' lives more difficult. Last week...
26 Aug 2024
Biztonsági szemle
India's Critical Infrastructure Suffers Spike in Cyberattacks
The financial and government sectors have come under increasing attacks in India, with the Reserve Bank of India (RBI) warning banks to double down on cybersecurity.
26 Aug 2024
Biztonsági szemle
ISC Stormcast For Monday, August 26th, 2024 https://isc.sans.edu/podcastdetail/9112, (Mon, Aug 26th)
(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
23 Aug 2024
Biztonsági szemle
Cthulhu Stealer malware scams macOS users — and its own affiliates
The malware-as-a-service is based on Atomic Stealer, charges half the price and imitates legitimate software.
23 Aug 2024
Biztonsági szemle
Man tried to hack database, fake own death to skirt child support
A man from Kentucky was convicted of trying to breach the state of Hawaii’s personal records database with the aim of avoiding child support.
23 Aug 2024
Biztonsági szemle
Constantly Evolving MoonPeak RAT Linked to North Korean Spying
The malware is a customized variant of the powerful open source XenoRAT information stealing malware often deployed by Kimsuky and other DPRK APTs.
23 Aug 2024
Biztonsági szemle
Faking your own death, Fake Reviews, Solar Winds, Recall, Winux, Kubernetes, and More - SWN #409
Pagination
- Previous page ‹‹
- Page 645
- Next page ››