[ad_1] Since at least May 2021, stealth Linux malware called AVrecon has been used to infect over 70,000 Linux-based Small Office/Home Office (SOHO) routers to a botnet designed to steal bandwidth and provide service. hidden residential proxy. This allows its…


[ad_1] Since at least May 2021, stealth Linux malware called AVrecon has been used to infect over 70,000 Linux-based Small Office/Home Office (SOHO) routers to a botnet designed to steal bandwidth and provide service. hidden residential proxy. This allows its…

[ad_1] The Cisco SD-WAN vManage management software is affected by a flaw that allows an unauthenticated remote attacker to obtain limited read or write permissions on the configuration of the affected instance. Cisco SD-WAN vManage is a cloud-based solution for…

[ad_1] Cybersecurity researchers and threat actors are targeted by fake proof-of-concept (PoC) exploit CVE-2023-35829 that installs Linux password-stealing malware. Uptycs analysts discovered the malicious PoC during their routine scans when detection systems reported irregularities such as unexpected network connections, unauthorized…

[ad_1] Google is fighting the constant invasion of malware on Google Play by requiring all new developer accounts registering as an organization to provide a valid DUNS number before submitting apps. The new measure aims to improve the security and…

[ad_1] Microsoft announced today that the next Windows 11, version 23H2 will be available in Q4 2023 as an activation package, as it shares the Windows 11 22H2 codebase and servicing branch. 23H2 fixes and improvements will be applied to…

[ad_1] Zimbra today urged administrators to manually fix an actively exploited zero-day vulnerability to target and compromise Zimbra Collaboration Suite (ZCS) mail servers. This widely adopted messaging and collaboration platform is currently used by more than 200,000 businesses in 140…

[ad_1] There are many avenues of attack a threat actor can take. The ones that have increased in recent years are user-centric applications. Instead of focusing on a better-protected administrator account, attackers target apps or extensions that a user can…

[ad_1] The source code for the BlackLotus UEFI bootkit has been leaked online, providing insight into a malware that has raised serious concerns among businesses, governments and the cybersecurity community. BlackLotus is a UEFI bootkit targeting Windows that bypasses Secure…

[ad_1] What's old is new again, with researchers seeing a threefold increase in malware distributed via USB drives in the first half of 2023 A new report from Beggar describes how two USB-delivered malware campaigns have been observed this year;…
Recent Posts
- ‘Evil Telegram’ Android apps on Google Play infected 60K with spyware
- Google rolls out Privacy Sandbox to use Chrome browsing history for ads
- Microsoft Teams phishing attack pushes DarkGate malware
- The Week in Ransomware – September 8th 2023
- Notepad++ 8.5.7 released with fixes for four security vulnerabilities
Recent News
-
Hackers steal Steam accounts in new…
September 13, 2022 -
New PsExec spin-off allows hackers to…
September 13, 2022 -
Hackers hack software provider for Magento…
September 13, 2022
Work Together
Let us help you protect your business from all malware, spyware and ransomware attacks.