Hackers hijack Linux devices using PRoot-isolated file systems
Hackers are using BYOF (bring your own filesystem) attacks to abuse the open-source Linux PRoot utility and develop a consistent source of harmful tools compatible with Linux devices.
A BYOF attack involves a threat actor building a malicious file system on their devices that includes a typical ... Read more
Typosquatting campaign impersonates 27 brands
27 brands from different sectors are being impersonated in a typosquatting campaign to trick unsuspecting users and install malware in their systems.
Typosquatting is as old as the internet. The technique involves a malicious actor creating a fake website with a domain name similar to a legitima... Read more
Maggie malware has gained backdoor access to hundreds of Microsoft SQL servers
Maggie is a new malware that has surfaced and is already gaining unauthorized backdoor access to several Microsoft SQL servers.
Researchers have recently discovered a malware named Maggie which has been gaining unauthorized backdoor access into several Microsoft SQL servers. John Aydinbas and Al... Read more
Hackers deliver malware through ‘mouseovers’ in PowerPoint files
Hackers suspected of working for Russia are utilizing Microsoft PowerPoint presentations (PTTs) to spread malware, using a hyperlink technique that acts as a set-off to trigger a malicious PowerShell script within the PPT.
There is no need for a malicious macro to execute or download the payload... Read more
Zscaler’s latest report raises red flags about ransomware
Despite consistent efforts to thwart it, ransomware remains a persistent problem for businesses and consumers worldwide.
Zscaler has released its latest report titled ThreatLabz 2022 Ransomware Report. The study has revealed the number and scope of ransomware attacks has grown unabated, generati... Read more
600,000 WordPress websites threatened by critical RCE vulnerability
Multiple versions of WordPress plugin 'Essential Addons for Elementor' are vulnerable to remote code execution (RCE). The plugin is used by hundreds of thousands of websites. The vulnerability is present in every version prior to 5.0.5.
Its attack surface is huge. According to WordPress, the plu... Read more
‘SolarWinds hack group Nobelium still has huge attack potential’
Nobelium, the hack group held responsible for the infamous SolarWinds attack, still has a large arsenal of advanced hacking capabilities at its disposal. This is the conclusion of Mandiant security specialists in a recent study. The full potential of the alleged state-sponsored collective has not y... Read more
Microsoft Exchange Server under threat from ProxyShell vulnerabilities
ProxyShell refers to a trio of security flaws that have already been addressed by Microsoft. However, not all instances are patched yet. Attackers are scanning the internet for Microsoft Exchange Server instances without patches for the ProxyShell vulnerability.
Researchers have sounded the alar... Read more
$1 trillion spent globally in 2020 to deal with cybercrime
Last year, more than $1 trillion was spent on cybersecurity or to pay for damages caused by cyberattacks. This amount represents about 1% of the world’s GDP. The report comes from Atlas VPN, which says that a majority of the money ($945 billion) was spent on Cybersecurity incidents. The remaining... Read more