Hackers Are Using Alternative Vectors as Microsoft Blocked Macros
With Microsoft disabling the macros by default, hackers are shifting to new alternative methods of deploying the malware on their target's computer, says Proofpoint...
Hackers Are Exploiting Publicly Disclosed Bugs Within 15 Minutes
To explain how faster the hackers are getting to exploit publicly disclosed vulnerabilities, Palo Alto's Unit 42 researchers shared an example of a critical...
ASUS and Gigabyte Motherboards Infected With a UEFI Rootkit
Kaspersky researchers have detailed a new variant of UEFI rootkit that's available in the ASUS and Gigabyte motherboards from 2013 to 2015 and is...
New QBot Campaign is Exploiting Windows 7 Calculator App
A security researcher detailed a new QBot campaign in the wild, exploiting the legitimate Windows 7 Calculator app for side loading the malware in...
North Korean APT is Targeting European Countries With Konni RAT
Researchers at Securonix detailed an ongoing campaign against several European countries, where North Korean-linked hackers (APT37) are cyber attacking with Konni RAT.
They named the...
Redeemer 2.0 Ransomware is Now Available to Noob Hackers For Free
The author of Redeemer ransomware is promoting his malware's 2.0 version in hacker forums, hoping to get affiliates and earn a part of their...
APTs Are Targeting Journalists With Impersonation Attacks
Proofpoint researchers noted a campaign where several APTs are targeting journalists and media organizations since they have access to non-public information.
Threat actors are posing...
Hackers Are Targeting an Abandoned WordPress Plugin to Exploit
Researchers at Defiant noted a sudden surge in attacks against Kaswara Modern WPBakery Page Builder - an abandoned WordPress plugin with millions of installs.
Attackers...
HolyGhost: A North Korean Ransomware Group With Aim of Financial Gains
Researchers at Microsoft Threat Intelligence Center noted a new ransomware actor that's targeting small businesses around the world, named as HolyGhost.
While they linked this...
PyPI to Enable 2FA on Critical Python Project Accounts
Observing the recent hijacking of several python projects, the Python Package Index (PyPI) is mandating two-factor authentication for the accounts of critical projects.
Certain projects...