Aggregator
CVE-2024-27659 | D-Link DIR-823G 1.0.2B05 sub_42AF30 null pointer dereference
CVE-2024-27660 | D-Link DIR-823G 1.0.2B05 sub_41C488 null pointer dereference
Китай разоблачил хакеров «тайваньской независимости»
Cloudflare Introduces E2E Post-Quantum Cryptography Protections
CyberJund Defaced the Website of Prof. Yoav Talmi
Apache Tomcat Vulnerability Actively Exploited Just 30 Hours After Public Disclosure
Beware of Free File Word To PDF Converter That Delivers Malware
The FBI has issued an urgent warning about the rising threat of malicious file conversion tools that are being used to spread malware across the United States. Cybercriminals are targeting users searching for free utilities to convert documents from one format to another, with Word to PDF converters being particularly common vectors for attack. Many […]
The post Beware of Free File Word To PDF Converter That Delivers Malware appeared first on Cyber Security News.
CVE-2024-48013 | Dell SmartFabric OS10 Software 10.5.4.x/10.5.5.x/10.5.6.x/10.6.0.x unnecessary privileges (dsa-2025-070)
StilachiRAT analysis: From system reconnaissance to cryptocurrency theft
Microsoft Incident Response uncovered a novel remote access trojan (RAT) named StilachiRAT, which demonstrates sophisticated techniques to evade detection, persist in the target environment, and exfiltrate sensitive data. This blog primarily focuses on analysis of the WWStartupCtrl64.dll module that contains the RAT capabilities and summarizes the malware’s key behaviors, capabilities, and the potential risk posed to systems and users.
The post StilachiRAT analysis: From system reconnaissance to cryptocurrency theft appeared first on Microsoft Security Blog.
Randall Munroe’s XKCD ‘Omniroll’
via the comic humor & dry wit of Randall Munroe, creator of XKCD
The post Randall Munroe’s XKCD ‘Omniroll’ appeared first on Security Boulevard.
StilachiRAT analysis: From system reconnaissance to cryptocurrency theft
Microsoft Incident Response uncovered a novel remote access trojan (RAT) named StilachiRAT, which demonstrates sophisticated techniques to evade detection, persist in the target environment, and exfiltrate sensitive data. This blog primarily focuses on analysis of the WWStartupCtrl64.dll module that contains the RAT capabilities and summarizes the malware’s key behaviors, capabilities, and the potential risk posed to systems and users.
The post StilachiRAT analysis: From system reconnaissance to cryptocurrency theft appeared first on Microsoft Security Blog.