Blumira research team has discovered an alternative attack vector in the Log4j vulnerability that relies on a basic Javascript WebSocket connection to trigger the RCE locally...
Organizations looking to secure their enterprise resource planning (ERP)’s security defenses are often required to sort through vendor claims of features that are unique to their...
An apparent security flaw in the Grim Finance protocol allowed the attacker to fake five additional deposits. The decentralized finance (DeFi) protocol Grim Finance reported $30...
Four well-renowned affiliated online sports gear websites have recently unveiled and reported a massive cyberattack. In this cyberattack, the hackers have compromised and stolen more than...
The UK National Crime Agency has shared a collection of more than 585 million compromised passwords it found during an investigation with Have I Been Pwned,...
Phorpiex, the botnet known for its diverse infrastructure and extortion campaigns, has resurfaced with its new variant named Twizt. Now, the botnet is using a method...
A new RAT named DarkWatchman is reportedly employing sneaky fileless techniques in a spear-phishing campaign. Written in Russian, the malware uses evasion methods to avoid detection...
A new malware named ‘DarkWatchman’ has emerged in the cybercrime underground, and it’s a lightweight and highly-capable JavaScript RAT (Remote Access Trojan) paired with a C#...
Since the middle of 2020, a Chinese state-sponsored threat actor called ‘Tropic Trooper’ has been targeting transportation organizations and government entities related to transportation sector, Trend Micro...
More than 35,000 Java packages, amounting to over 8% of the Maven Central repository (the most significant Java package repository), have been impacted by the recently disclosed log4j...