Aggregator
CVE-2014-2053 | ownCloud up to 6.0.1 getID3 xml external entity reference (News 29405 / Nessus ID 77157)
CVE-2014-2054 | ownCloud up to 6.0.1 xml external entity reference (ID 801070)
CVE-2014-2055 | Fruux SabreDAV up to 1.8.9 xml external entity reference (ID 801070)
DarkCloud: An Advanced Stealer Malware Sold on Telegram to Target Windows Data
DarkCloud, a highly advanced stealer malware, has emerged as a significant threat to Windows systems since its debut in 2022. Initially gaining traction through underground forums, the malware is now widely sold on Telegram, making it accessible to cybercriminals worldwide. DarkCloud employs a variety of distribution techniques, with phishing campaigns being the most prevalent. Attackers […]
The post DarkCloud: An Advanced Stealer Malware Sold on Telegram to Target Windows Data appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Top 10 Most-Used RDP Passwords Are Not Complex Enough
Triton RAT Uses Telegram for Remote System Access and Control
Cado Security Labs has uncovered a new Python-based Remote Access Tool (RAT) named Triton RAT, which leverages Telegram for remote system access and data exfiltration. This open-source malware, available on GitHub, is designed to execute a wide range of malicious activities, including credential theft, system control, and persistence establishment. Technical Overview Triton RAT initiates its […]
The post Triton RAT Uses Telegram for Remote System Access and Control appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.