H January(103) February(113) March(175) APRIL(74) MAY(28) JUNE(198) July(423) August(462) September(389) October(48) November() December()
DATE
NAME
CATEGORY
WEB
31.1.23
New Report Reveals NikoWiper Malware That Targeted Ukraine Energy Sector
Virus
The Hacker News
Researchers Uncover Packer Used by Several Malware to Evade Detection for 6 Years
QNAP Fixes Critical Vulnerability in NAS Devices with Latest Security Updates
Vulnerebility
GitHub Breach: Hackers Stole Code-Signing Certificates for GitHub Desktop and Atom
Incindent
Titan Stealer: A New Golang-Based Information Stealer Malware Emerges
Realtek Vulnerability Under Attack: Over 134 Million Attempts to Hack IoT Devices
Gootkit Malware Continues to Evolve with New Components and Obfuscations
28.1.23
Microsoft Urges Customers to Secure On-Premises Exchange Servers
ISC Releases Security Patches for New BIND DNS Software Vulnerabilities
Ukraine Hit with New Golang-based 'SwiftSlicer' Wiper Malware in Latest Cyber Attack
BigBrothers
27.1.23
Experts Uncover the Identity of Mastermind Behind Golden Chickens Malware Service
Researchers Discover New PlugX Malware Variant Spreading via Removable USB Devices
3 Lifehacks While Analyzing Orcus RAT in a Malware Sandbox
British Cyber Agency Warns of Russian and Iranian Hackers Targeting Key Industries
Hive Ransomware Infrastructure Seized in Joint International Law Enforcement Effort
Ransomware
Google Takes Down 50,000 Instances of Pro-Chinese DRAGONBRIDGE Influence Operation
26.1.23
Researchers Release PoC Exploit for Windows CryptoAPI Bug Discovered by NSA
Exploit
Researchers Uncover Connection b/w Moses Staff and Emerging Abraham's Ax Hacktivists Group
Hacking
PY#RATION: New Python-based RAT Uses WebSocket for C2 and Data Exfiltration
U.S. Federal Agencies Fall Victim to Cyber Attack Utilizing Legitimate RMM Software
Over 4,500 WordPress Sites Hacked to Redirect Visitors to Sketchy Ad Pages
25.1.23
North Korean Hackers Turn to Credential Harvesting in Latest Wave of Cyberattacks
LastPass Parent Company GoTo Suffers Data Breach, Customers' Backups Compromised
VMware Releases Patches for Critical vRealize Log Insight Software Vulnerabilities
Chinese Hackers Utilize Golang Malware in DragonSpark Attacks to Evade Detection
FBI Says North Korean Hackers Behind $100 Million Horizon Bridge Crypto Theft
Security Navigator Research: Some Vulnerabilities Date Back to the Last Millennium
Emotet Malware Makes a Comeback with New Evasion Techniques
Apple Issues Updates for Older Devices to Fix Actively Exploited Vulnerability
Apple
Facebook Introduces New Features for End-to-End Encrypted Messenger App
Social
Samsung Galaxy Store App Found Vulnerable to Sneaky App Installs and Fraud
Mobil
Massive Ad Fraud Scheme Targeted Over 11 Million Devices with 1,700 Spoofed Apps
Crime
20.1.23
Roaming Mantis Spreading Mobile Malware That Hijacks Wi-Fi Routers' DNS Settings
Gamaredon Group Launches Cyberattacks Against Ukraine Using Telegram
WhatsApp Hit with €5.5 Million Fine for Violating Data Protection Laws
Chinese Hackers Exploited Recent Fortinet Flaw as 0-Day to Drop Malware
19.1.23
New Microsoft Azure Vulnerability Uncovered — Experts Warn of RCE Attacks
Android Users Beware: New Hook Malware with RAT Capabilities Emerges
Android
New Research Delves into the World of Malicious LNK Files and Hackers Behind Them
Bitzlato Crypto Exchange Founder Arrested for Aiding Cybercriminals
Cryptocurrency
Mailchimp Suffers Another Security Breach Compromising Some Customers' Information
Earth Bogle Campaign Unleashes NjRAT Trojan on Middle East and North Africa
18.1.23
Iranian Government Entities Under Attack by New Wave of BackdoorDiplomacy Attacks
Critical Security Vulnerabilities Discovered in Netcomm and TP-Link Routers
Git Users Urged to Update Software to Prevent Remote Code Execution Attacks
Attack
CISA Warns of Flaws in Siemens, GE Digital, and Contec Industrial Control Systems
ICS
17.1.23
Microsoft Azure Services Flaws Could've Exposed Cloud Resources to Unauthorized Access
Hackers Can Abuse Legitimate GitHub Codespaces Feature to Deliver Malware
Zoho ManageEngine PoC Exploit to be Released Soon - Patch Before It's Too Late!
Researchers Uncover 3 PyPI Packages Spreading Malware to Developer Systems
16.1.23
Raccoon and Vidar Stealers Spreading via Massive Network of Fake Cracked Software
A Secure User Authentication Method – Planning is More Important than Ever
Security
New Backdoor Created Using Leaked CIA's Hive Malware Discovered in the Wild
14.1.23
Malware Attack on CircleCI Engineer's Laptop Leads to Recent Security Incident
Cacti Servers Under Attack as Majority Fail to Patch Critical Vulnerability
TikTok Fined $5.4 Million by French Regulator for Violating Cookie Laws
Cisco Issues Warning for Unpatched Vulnerabilities in EoL Business Routers
Beware: Tainted VPNs Being Used to Spread EyeSpy Surveillanceware
Cybercriminals Using Polyglot Files in Malware Distribution to Fly Under the Radar
CyberCrime
FortiOS Flaw Exploited as Zero-Day in Attacks on Government and Organizations
IcedID Malware Strikes Again: Active Directory Domain Compromised in Under 24 Hours
12.1.23
Over 100 Siemens PLC Models Found Vulnerable to Firmware Takeover
Experts Detail Chromium Browser Security Flaw Putting Confidential Data at Risk
Twitter Denies Hacking Claims, Assures Leaked User Data Not from its System
Alert: Hackers Actively Exploiting Critical "Control Web Panel" RCE Vulnerability
New Analysis Reveals Raspberry Robin Can be Repurposed by Other Threat Actors
Australian Healthcare Sector Targeted in Latest Gootkit Malware Attacks
Dark Pink APT Group Targets Governments and Military in APAC Region
APT
Microsoft Issues January 2023 Patch Tuesday Updates, Warns of Zero-Day Exploit
StrongPity Hackers Distribute Trojanized Telegram App to Target Android Users
Expert Analysis Reveals Cryptographic Weaknesses in Threema Messaging App
Italian Users Warned of Malware Attack Targeting Sensitive Information
Severe Security Flaw Found in "jsonwebtoken" Library Used by 22,000+ Projects
Kinsing Crypto Malware Hits Kubernetes Clusters via Misconfigured PostgreSQL
New Study Uncovers Text-to-SQL Model Vulnerabilities Allowing Data Theft and DoS Attacks
Millions of Vehicles at Risk: API Vulnerabilities Uncovered in 16 Major Car Brands
Malicious PyPI Packages Using Cloudflare Tunnels to Sneak Through Firewalls
Hackers Can Abuse Visual Studio Marketplace to Target Developers with Malicious Extensions
Russian Turla Hackers Hijack Decade-Old Malware Infrastructure to Deploy New Backdoors
Hackers Using CAPTCHA Bypass Tactics in Freejacking Campaign on GitHub
Microsoft Reveals Tactics Used by 4 Ransomware Families Targeting macOS
Dridex Malware Now Attacking macOS Systems with Novel Infection Method
Rackspace Confirms Play Ransomware Gang Responsible for Recent Breach
WhatsApp Introduces Proxy Support to Help Users Bypass Internet Censorship
Blind Eagle Hackers Return with Refined Tools and Sophisticated Infection Chain
Bluebottle Cybercrime Group Preys on Financial Sector in French-Speaking African Nations
SpyNote Strikes Again: Android Spyware Targeting Financial Institutions
Mitigate the LastPass Attack Surface in Your Environment with this Free Tool
CircleCI Urges Customers to Rotate Secrets Following Security Incident
The Evolving Tactics of Vidar Stealer: From Phishing Emails to Social Media
Fortinet and Zoho Urge Customers to Patch Enterprise Software Vulnerabilities
Irish Regulators Fine Facebook $414 Million for Forcing Users to Accept Targeted Ads
Qualcomm Chipsets and Lenovo BIOS Get Security Updates to Fix Multiple Flaws
The FBI's Perspective on Ransomware
New shc-based Linux Malware Targeting Systems with Cryptocurrency Miner
Synology Releases Patch for Critical RCE Vulnerability Affecting VPN Plus Servers
Enforcement vs. Enrollment-based Security: How to Balance Security and Employee Trust
Hackers Using Stolen Bank Information to Trick Victims into Downloading BitRAT Malware
Raspberry Robin Worm Evolves to Attack Financial and Insurance Sectors in Europe
RedZei Chinese Scammers Targeting Chinese Students in the U.K.
Spam
PyTorch Machine Learning Framework Compromised with Malicious Dependency
WordPress Security Alert: New Linux Malware Exploiting Over Two Dozen CMS Flaws
Google to Pay $29.5 Million to Settle Lawsuits Over User Location Tracking