FreshRSS

πŸ”’
❌ Secure Planet Training Courses Updated For 2019 - Click Here
There are new available articles, click to refresh the page.
☐ β˜† βœ‡ The Hacker News

Foxit PDF Reader Flaw Exploited by Hackers to Deliver Diverse Malware Arsenal

By: Newsroom β€” May 20th 2024 at 12:20
Multiple threat actors are weaponizing a design flaw in Foxit PDF Reader to deliver a variety of malware such as Agent Tesla, AsyncRAT, DCRat, NanoCore RAT, NjRAT, Pony, Remcos RAT, and XWorm. "This exploit triggers security warnings that could deceive unsuspecting users into executing harmful commands," Check Point said in a technical report. "This exploit has been used by multiple
☐ β˜† βœ‡ The Hacker News

Raspberry Robin Returns: New Malware Campaign Spreading Through WSF Files

By: Newsroom β€” April 10th 2024 at 13:10
Cybersecurity researchers have discovered a new Raspberry Robin campaign wave that has been propagating the malware through malicious Windows Script Files (WSFs) since March 2024. "Historically, Raspberry Robin was known to spread through removable media like USB drives, but over time its distributors have experimented with other initial infection vectors," HP Wolf Security researcher Patrick
☐ β˜† βœ‡ The Hacker News

LockBit Ransomware Exploiting Critical Citrix Bleed Vulnerability to Break In

By: Newsroom β€” November 22nd 2023 at 04:49
Multiple threat actors, including LockBit ransomware affiliates, areΒ actively exploitingΒ a recently disclosed critical security flaw in Citrix NetScaler application delivery control (ADC) and Gateway appliances to obtain initial access to target environments. The joint advisory comes from the U.S. Cybersecurity and Infrastructure Security Agency (CISA), Federal Bureau of Investigation (FBI),
☐ β˜† βœ‡ The Hacker News

Russian Cyber Espionage Group Deploys LitterDrifter USB Worm in Targeted Attacks

By: Newsroom β€” November 18th 2023 at 06:32
Russian cyber espionage actors affiliated with the Federal Security Service (FSB) have been observed using a USB propagating worm calledΒ LitterDrifterΒ in attacks targeting Ukrainian entities. Check Point, whichΒ detailedΒ Gamaredon's (aka Aqua Blizzard, Iron Tilden, Primitive Bear, Shuckworm, and Winterflounder) latest tactics, branded the group as engaging in large-scale campaigns that are
☐ β˜† βœ‡ The Hacker News

Researchers Uncover Ongoing Attacks Targeting Asian Governments and Telecom Giants

By: Newsroom β€” October 12th 2023 at 06:20
High-profile government and telecom entities in Asia have been targeted as part of an ongoing campaign since 2021 that's designed to deploy basic backdoors and loaders for delivering next-stage malware. Cybersecurity company Check Point is tracking the activity under the nameΒ Stayin' Alive. Targets include organizations located in Vietnam, Uzbekistan, Pakistan, and Kazakhstan. "The simplistic
☐ β˜† βœ‡ The Hacker News

New Variant of Banking Trojan BBTok Targets Over 40 Latin American Banks

By: THN β€” September 22nd 2023 at 14:48
An active malware campaign targeting Latin America is dispensing a new variant of a banking trojan calledΒ BBTok, particularly users in Brazil and Mexico. "The BBTok banker has a dedicated functionality that replicates the interfaces of more than 40 Mexican and Brazilian banks, and tricks the victims into entering its 2FA code to their bank accounts or into entering their payment card number,"
☐ β˜† βœ‡ The Hacker News

New Report Exposes Vice Society's Collaboration with Rhysida Ransomware

By: The Hacker News β€” August 9th 2023 at 04:20
Tactical similarities have been unearthed between the double extortion ransomware group known as Rhysida and Vice Society, including in their targeting of education and healthcare sectors. "As Vice Society was observed deploying a variety of commodity ransomware payloads, this link does not suggest that Rhysida is exclusively used by Vice Society, but shows with at least medium confidence that
☐ β˜† βœ‡ The Hacker News

Sophisticated BundleBot Malware Disguised as Google AI Chatbot and Utilities

By: THN β€” July 21st 2023 at 12:10
A new malware strain known as BundleBot has been stealthily operating under the radar by taking advantage ofΒ .NET single-file deployment techniques, enabling threat actors to capture sensitive information from compromised hosts. "BundleBot is abusing the dotnet bundle (single-file), self-contained format that results in very low or no static detection at all," Check PointΒ saidΒ in a report
❌