Attackers

Attackers Exploiting Google Chrome on Windows 10 for UAC Bypass

Rapid7 unearthed a malicious campaign  targeting Windows 10 running on Chrome browsers. The objective of the campaign is to obtain… Read More

3 years ago

Attackers Targeting a Zero-Day Bug in BillQuick Billing System

Researchers have disclosed details about a now-patched critical vulnerability in a time and billing system called BillQuick that was being… Read More

3 years ago

Bug in Popular WinRAR Software Could Let Attackers Hack Your Computer

A remote attacker could abuse the flaw to execute arbitrary code on targeted systems, underscoring how vulnerabilities in such software… Read More

3 years ago

Squirrel Engine Bug Could Let Attackers Hack Games and Cloud Services

Tracked as CVE-2021-41556, the issue occurs when a game library referred to as Squirrel Engine is used to execute untrusted… Read More

3 years ago

Secure your databases against opportunistic attackers

If you connect databases / servers to the internet and secure them poorly, you can count on them getting compromised… Read More

3 years ago

How Attackers Used Math Symbols to Evade Detection

Experts reported a phishing attempt targeted at Verizon that involves the use of mathematical symbols to bypass anti-phishing systems to… Read More

3 years ago

Attackers Behind Trickbot Expanding Malware Distribution Channels

The operators behind the pernicious TrickBot malware have resurfaced with new tricks that aim to increase its foothold by expanding… Read More

3 years ago

QNAP fixes bug that let attackers run malicious commands remotely

Three of the security flaws fixed today by QNAP are high severity stored cross-site scripting (XSS) vulnerabilities tracked as CVE-2021-34354,… Read More

3 years ago

Attackers Use Fake Installers to Drop Malware and Open Doors for Cryptomining and Credential Theft

Fake installers of popular software are being used to deliver malware onto victims’ devices. These lures trick users into opening… Read More

3 years ago

Stairwell secures $20M Series A to help organizations outsmart attackers

As well as raising $20 million, a round co-led by Sequoia Capital and Accel, Stairwell launched its threat-hunting platform to… Read More

3 years ago

A New Vulnerability Found in Apple’s macOS Finder Lets Attackers Run Commands Remotely

New macOS zero-day bug lets attackers run commands remotely A new vulnerability in Apple’s macOS Finder was revealed today, allowing… Read More

3 years ago

Attackers Impersonate DoT in Two-Day Phishing Scam

Threat actors impersonated the USDOT in a phishing campaign that used a combination of tactics – including creating new domains… Read More

3 years ago

BladeHawk Attackers Target Kurds with Android Apps

BladeHawk attackers have been targeting the Kurdish ethnic group for more than a year through a Facebook-based spyware campaign that… Read More

3 years ago

BladeHawk attackers spy on Kurds with fake Android apps

A year-long mobile espionage campaign has been targeted against the Kurdish ethnic group to deploy two Android backdoors that masquerade… Read More

3 years ago

Autodesk Says Company Was Targeted by SolarWinds Attackers

Autodesk, a California-based design software and 3D technology firm, has acknowledged that it was one of several tech and security… Read More

3 years ago

Security Vulnerabilities in IoT Baby Monitors Could Allow Attackers Access to Camera Feeds

If exploited, an attacker could discover cameras that they do not own, instruct these cameras to broadcast their feeds to… Read More

3 years ago