FreshRSS

πŸ”’
❌ Secure Planet Training Courses Updated For 2019 - Click Here
There are new available articles, click to refresh the page.
☐ β˜† βœ‡ The Hacker News

Vietnam-Based Hackers Steal Financial Data Across Asia with Malware

By: Newsroom β€” April 4th 2024 at 15:42
A suspected Vietnamese-origin threat actor has been observed targeting victims in several Asian and Southeast Asian countries with malware designed to harvest valuable data since at least May 2023. Cisco Talos is tracking the cluster under the name CoralRaider, describing it as financially motivated. Targets of the campaign include India, China, South Korea, Bangladesh, Pakistan, Indonesia,
☐ β˜† βœ‡ The Hacker News

Fortinet Warns of Severe SQLi Vulnerability in FortiClientEMS Software

By: The Hacker News β€” March 14th 2024 at 04:21
Fortinet has warned of a critical security flaw impacting its FortiClientEMS software that could allow attackers to achieve code execution on affected systems. "An improper neutralization of special elements used in an SQL Command ('SQL Injection') vulnerability [CWE-89] in FortiClientEMS may allow an unauthenticated attacker to execute unauthorized code or commands via specifically crafted
☐ β˜† βœ‡ The Hacker News

8,000+ Domains of Trusted Brands Hijacked for Massive Spam Operation

By: Newsroom β€” February 26th 2024 at 14:10
More than 8,000 domains and 13,000 subdomains belonging to legitimate brands and institutions have been hijacked as part of a sophisticated distribution architecture for spam proliferation and click monetization. Guardio Labs is tracking the coordinated malicious activity, which has been ongoing since at least September 2022, under the name SubdoMailing. The emails range from "counterfeit
☐ β˜† βœ‡ The Hacker News

iOS Zero-Day Attacks: Experts Uncover Deeper Insights into Operation Triangulation

By: Newsroom β€” October 24th 2023 at 08:37
The TriangleDB implant used to target Apple iOS devices packs in at least four different modules to record microphone, extract iCloud Keychain, steal data from SQLite databases used by various apps, and estimate the victim's location. The new findings come from Kaspersky, which detailed the great lengths the adversary behind the campaign, dubbedΒ Operation Triangulation, went to conceal and cover
☐ β˜† βœ‡ The Hacker News

Trojanized TOR Browser Installers Spreading Crypto-Stealing Clipper Malware

By: Ravie Lakshmanan β€” March 29th 2023 at 09:17
Trojanized installers for the TOR anonymity browser are being used to target users in Russia and Eastern Europe withΒ clipper malwareΒ designed to siphon cryptocurrencies since September 2022. "Clipboard injectors [...] can be silent for years, show no network activity or any other signs of presence until the disastrous day when they replace a crypto wallet address," Vitaly Kamluk, director of
❌