Cyber security news for all

More

    Malware & Threats

    Hackers Exploit Corrupted ZIP Files and Office Documents to Outsmart Email Defenses

    Cybersecurity analysts have spotlighted a cunning phishing operation employing corrupted Microsoft Office documents and ZIP files to slip through email security measures undetected. "This ongoing...

    Researchers Unveil “Bootkitty” – First UEFI Bootkit Targeting Linux Systems

    Cybersecurity researchers have unveiled a groundbreaking development in the threat landscape: Bootkitty, the first known Unified Extensible Firmware Interface (UEFI) bootkit specifically engineered for...

    PyPI Python Library “aiocpa” Quarantined for Stealing Crypto Keys via Telegram Bot

    The Python Package Index (PyPI) has taken swift action to quarantine the library "aiocpa" after it was discovered to contain malicious code designed to...

    NSO Group Exploited WhatsApp to Deploy Pegasus Spyware Despite Legal Action by Meta

    Newly unsealed legal documents have shed light on a troubling narrative involving NSO Group and its persistent exploitation of WhatsApp. The Israeli spyware company...

    New RustyAttr Malware Infiltrates macOS Using Extended Attribute Manipulation

    Cyber adversaries have recently unveiled an innovative tactic, exploiting extended attributes in macOS files to covertly deploy a new malware strain known as RustyAttr. Singapore-based...

    Russian Hackers Exploit Newly Revealed NTLM Vulnerability to Deploy RAT Malware via Sophisticated Phishing Tactics

    A recently addressed security flaw in the Windows NT LAN Manager (NTLM) system has become the target of exploitation by a suspected Russia-aligned cyber...

    Recent Articles