From Cybersecurity Help – Threat actors abusing Foxit PDF Reader flaw to deploy multiple malware variants
The flaw involves Foxit PDF Reader’s handling of pop-up messages. Read More
Aggregating Cyber Insights
The flaw involves Foxit PDF Reader’s handling of pop-up messages. Read More
Mustang Panda infiltrated the computer systems of cargo shipping companies in Norway, Greece, and the Netherlands. Read More
Grandoreiro now targets over 1,500 banks worldwide, spanning more than 60 countries across Central and South America, Africa, Europe, and the Indo-Pacific region. Read More
The accused orchestrated an elaborate syndicate that managed the proceeds from “pig butchering” scams. Read More
In brief: Google, Apple, and Microsoft fix zero-days, BreachForums seized, the US takes actions against North Korean IT workers, and more. Read More
Authorities have yet to make official statement regarding the shutdown. Read More
This is a third zero-day flaw patched by Google within two weeks. Read More
Both backdoors implement a loader that decrypts payloads using DNS domain names, as well as the ability to execute Lua scripts. Read More
Ebury employs numerous tactics, such as intercepting SSH traffic in data centers and using hacked servers for ARP spoofing. Read More
The threat actors leveraged free and web-based infrastructure, such as FileZilla servers, as a means for malware delivery. Read More
One of the zero-days was linked to the QakBot botnetю Read More
The campaigns showcase how malicious actors evolve their tactics to bypass traditional network security measures. Read More
The announcement of the sale includes both the Windows and Linux/ESXi versions of INC. Read More
The threat actors escalate their attack by directly contacting affected users via phone calls. Read More
The tech giant didn’t reveal any additional details regarding the nature of the exploitation of the vulnerability. Read More