Aggregator
New ManticoraLoader – Malware Attacking Citrix Users To Steal Data
Cyble Research & Intelligence Labs has recently found information about a new type of malware-as-a-service (MaaS) called ‘ManticoraLoader’ in some underground forums. Since August 8, 2024, on forums and Telegram, this MaaS service has been offered by the threat group “DeadXInject.” These actors were also behind the development of the “AresLoader” malware and went after […]
The post New ManticoraLoader – Malware Attacking Citrix Users To Steal Data appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
航空安全系统曝严重漏洞,黑客可绕过安检进入驾驶舱
系统被黑致使客户摄像头遭未授权访问,这家安防公司被罚超2000万元
Head Mare Hacktivist Group Exploit WinRAR Vulnerability To Encrypt Windows And Linux
Head Mare, a Russian-focused hacktivist group, gained notoriety in 2023 by targeting organizations in Russia and Belarus as they employ phishing tactics to distribute WinRAR archives exploiting the CVE-2023-38831 vulnerability, gaining initial access to victims’ systems. Once inside, they steal sensitive data and encrypt devices using LockBit and Babuk ransomware, whose toolset and tactics align […]
The post Head Mare Hacktivist Group Exploit WinRAR Vulnerability To Encrypt Windows And Linux appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Release Notes: New YARA Rules, Signatures, Config Extractors, and More
Welcome to ANY.RUN‘s monthly update, where we share what our team has been working on. In August, we focused on enhancing our detection tools and improving your experience. We added the new XOR-URL extractor, updated YARA rules, added new signatures, and improved network detection rules. Here’s a closer look at what we’ve done in […]
The post Release Notes: New YARA Rules, Signatures, Config Extractors, and More appeared first on ANY.RUN's Cybersecurity Blog.
Top 5 CVEs and Vulnerabilities of August 2024: Key Threats and How to Respond
August has seen some of the most eye-opening vulnerabilities surface, catching the attention of security experts across the globe. These aren’t just numbers in a database, they represent real challenges...
The post Top 5 CVEs and Vulnerabilities of August 2024: Key Threats and How to Respond appeared first on Strobes Security.
The post Top 5 CVEs and Vulnerabilities of August 2024: Key Threats and How to Respond appeared first on Security Boulevard.
North Korean Hackers Actively Exploiting Chromium RCE Zero-Day In The Wild
Microsoft has identified a North Korean threat actor, Citrine Sleet, exploiting a zero-day vulnerability in Chromium (CVE-2024-7971) to gain remote code execution on cryptocurrency targets. The threat actor deployed the FudModule rootkit, previously attributed to Diamond Sleet, suggesting potential shared use of malware between these North Korean threat actors. The V8 JavaScript engine in Chrome […]
The post North Korean Hackers Actively Exploiting Chromium RCE Zero-Day In The Wild appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
New Custom Malware “Tickler” Attack Satellite Devices
Microsoft identified a new custom multi-stage backdoor, “Tickler,” deployed by the Iranian state-sponsored threat actor Peach Sandstorm between April and July 2024. Targeting sectors like satellite, communications equipment, oil and gas, and government, Tickler has been used to gather intelligence. Peach Sandstorm also conducted password spray attacks on educational and government sectors. The group employed […]
The post New Custom Malware “Tickler” Attack Satellite Devices appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
CVE-2024-38811 | Vmware Fusion up to 13.5 on macOS Environment Variable environment input validation
第103篇:对一个加密混淆的java内存马的反混淆实战分析
VIVOTEK RealSight Engine improves images clarity in various scenarios
VIVOTEK has announced an upgrade to its comprehensive AI security solution with the release of the new AI feature, RealSight Engine. This feature transforms images captured by network cameras into clear, visible facial images under any lighting conditions. Even in backlit environments, facial expressions are rendered with exceptional clear. The solution eliminates complex settings, enabling immediate activation upon installation. It optimizes operational efficiency in environments such as dimly lit galleries, suburban dark parks, and low-light … More →
The post VIVOTEK RealSight Engine improves images clarity in various scenarios appeared first on Help Net Security.
Криптографический крах Kerberos: даже самые защищённые ОС не спасут ваши данные
新一批十家人工智能服务软件通过备案 一家网安企业入选
安全改造不是非要伤筋动骨 “免改造”或为数据安全升级新解法
蓝队宝典⑤【异常流量篇】异常流量阻断技战法分析与应用
Ransomhub Attacked 210 Victims Since Feb 2024, CISA Released Advisory For Defenders
The FBI, CISA, MS-ISAC, and HHS have released a joint advisory detailing known RansomHub ransomware indicators of compromise (IOCs) and tactics, techniques, and procedures (TTPs). RansomHub, a ransomware-as-a-service variant, has been active since February 2024, targeting various critical infrastructure sectors, and affiliates use a double-extortion model, encrypting systems and exfiltrating data. Victims receive a ransom […]
The post Ransomhub Attacked 210 Victims Since Feb 2024, CISA Released Advisory For Defenders appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.