Tuesday, November 19, 2024
Home 2022 June

Monthly Archives: June 2022

ZuoRAT Malware Hijacking Home-Office Routers to Spy on Targeted Networks

0
A never-before-seen remote access trojan dubbed ZuoRAT has been singling out small office/home office (SOHO) routers as part of a sophisticated campaign targeting North American and...

APT Hackers Targeting Industrial Control Systems with ShadowPad Backdoor

0
Entities located in Afghanistan, Malaysia, and Pakistan are in the crosshairs of an attack campaign that targets unpatched Microsoft Exchange Servers as an initial...

Overview of Top Mobile Security Threats in 2022

0
Your smartphone is your daily companion. The chances are that most of our activities rely on them, from ordering food to booking medical appointments....

OpenSSL to Release Security Patch for Remote Memory Corruption Vulnerability

0
The latest version of the OpenSSL library has been discovered as susceptible to a remote memory-corruption vulnerability on select systems. The issue has been identified...

New Android Banking Trojan ‘Revive’ Targeting Users of Spanish Financial Services

0
A previously unknown Android banking trojan has been discovered in the wild, targeting users of the Spanish financial services company BBVA. Said to be in...

New YTStealer Malware Aims to Hijack Accounts of YouTube Content Creators

0
Cybersecurity researchers have documented a new information-stealing malware that targets YouTube content creators by plundering their authentication cookies. Dubbed "YTStealer" by Intezer, the malicious tool...

New UnRAR Vulnerability Could Let Attackers Hack Zimbra Webmail Servers

0
A new security vulnerability has been disclosed in RARlab's UnRAR utility that, if successfully exploited, could permit a remote attacker to execute arbitrary code...

New ‘FabricScape’ Bug in Microsoft Azure Service Fabric Impacts Linux Workloads

0
Cybersecurity researchers from Palo Alto Networks Unit 42 disclosed details of a new security flaw affecting Microsoft's Service Fabric that could be exploited to obtain elevated...

CISA Warns of Active Exploitation of ‘PwnKit’ Linux Vulnerability in the Wild

0
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) this week moved to add a Linux vulnerability dubbed PwnKit to its Known Exploited Vulnerabilities Catalog, citing evidence of active exploitation. The...

Critical Security Flaws Identified in CODESYS ICS Automation Software

0
CODESYS has released patches to address as many as 11 security flaws that, if successfully exploited, could result in information disclosure and a denial-of-service...