Skip to content
software vulnerability Page 136

software vulnerability

HeadCrab 2.0 Goes Fileless, Targeting Redis Servers for Crypto Mining

HeadCrab 2.0 Goes Fileless, Targeting Redis Servers for Crypto Mining

?Feb 01, 2024?NewsroomCryptocurrency / Botnet Cybersecurity researchers have detailed an updated version of the malware HeadCrab that’s known to target Redis database servers across the world since early September 2021. The development, which comes exactly… 

New Malware Emerges in Attacks Exploiting Ivanti VPN Vulnerabilities

New Malware Emerges in Attacks Exploiting Ivanti VPN Vulnerabilities

?Feb 01, 2024?NewsroomNetwork Security / Malware Google-owned Mandiant said it identified new malware employed by a China-nexus espionage threat actor known as UNC5221 and other threat groups during post-exploitation activity targeting Ivanti Connect Secure VPN… 

CISA Warns of Active Exploitation of Critical Vulnerability in iOS, iPadOS, and macOS

CISA Warns of Active Exploitation of Critical Vulnerability in iOS, iPadOS, and macOS

?Feb 01, 2024?NewsroomVulnerability / Software Update The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Wednesday added a high-severity flaw impacting iOS, iPadOS, macOS, tvOS, and watchOS to its Known Exploited Vulnerabilities (KEV) catalog, based… 

Telegram Marketplaces Fuel Phishing Attacks with Easy-to-Use Kits and Malware

Telegram Marketplaces Fuel Phishing Attacks with Easy-to-Use Kits and Malware

?Jan 31, 2024?NewsroomCyber Crime / Hacking News Cybersecurity researchers are calling attention to the “democratization” of the phishing ecosystem owing to the emergence of Telegram as an epicenter for cybercrime, enabling threat actors to mount… 

Italian Businesses Hit by Weaponized USBs Spreading Cryptojacking Malware

Italian Businesses Hit by Weaponized USBs Spreading Cryptojacking Malware

?Jan 31, 2024?NewsroomCryptocurrency / Cybersecurity A financially motivated threat actor known as UNC4990 is leveraging weaponized USB devices as an initial infection vector to target organizations in Italy. Google-owned Mandiant said the attacks single out… 

Chinese Hackers Exploiting VPN Flaws to Deploy KrustyLoader Malware

Chinese Hackers Exploiting VPN Flaws to Deploy KrustyLoader Malware

?Jan 31, 2024?NewsroomCyber Attack / Network Security A pair of recently disclosed zero-day flaws in Ivanti Connect Secure (ICS) virtual private network (VPN) devices have been exploited to deliver a Rust-based payload called KrustyLoader that’s…