Security
Headlines
HeadlinesLatestCVEs

Tag

#backdoor

Container Supply Chain Attacks Cash In on Cryptojacking

Cloud-native threats are costing cloud customer victims money as cryptojackers mine their vulnerable cloud instances.

DARKReading
#git#backdoor#aws#auth#docker
Hackers Using PowerPoint Mouseover Trick to Infect System with Malware

The Russian state-sponsored threat actor known as APT28 has been found leveraging a new code execution method that makes use of mouse movement in decoy Microsoft PowerPoint documents to deploy malware. The technique "is designed to be triggered when the user starts the presentation mode and moves the mouse," cybersecurity firm Cluster25 said in a technical report. "The code execution runs a

US branch of Israeli defense contractor Elbit hit by data breach

By Waqas According to the breach notification, 369 Elbit Systems employees got their information stolen by the attackers. This is a post from HackRead.com Read the original post: US branch of Israeli defense contractor Elbit hit by data breach

New NullMixer Malware Campaign Stealing Users' Payment Data and Credentials

Cybercriminals are continuing to prey on users searching for cracked software by directing them to fraudulent websites hosting weaponized installers that deploy malware called NullMixer on compromised systems. "When a user extracts and executes NullMixer, it drops a number of malware files to the compromised machine," cybersecurity firm Kaspersky said in a Monday report. "It drops a wide variety

Backdoor.Win32.Augudor.b MVID-2022-0644 Code Execution

Backdoor.Win32.Augudor.b malware suffers from a code execution vulnerability.

Backdoor.Win32.Psychward.b MVID-2022-0645 Hardcoded Credential

Backdoor.Win32.Psychward.b malware suffers from a hardcoded credential vulnerability.

Chinese Espionage Hackers Target Tibetans Using New LOWZERO Backdoor

A China-aligned advanced persistent threat actor known as TA413 weaponized recently disclosed flaws in Sophos Firewall and Microsoft Office to deploy a never-before-seen backdoor called LOWZERO as part of an espionage campaign aimed at Tibetan entities. Targets primarily consisted of organizations associated with the Tibetan community, including enterprises associated with the Tibetan

New Spam Attack Abusing OAuth Apps to Target Microsoft Exchange Servers

By Deeba Ahmed According to Microsoft 365 Defender Research Team, in an incident they analyzed, malicious OAuth applications were deployed on compromised cloud tenants, and eventually, attackers took over Exchange servers to carry out spam campaigns. This is a post from HackRead.com Read the original post: New Spam Attack Abusing OAuth Apps to Target Microsoft Exchange Servers

Cyberattackers Compromise Microsoft Exchange Servers via Malicious OAuth Apps

Cybercriminals took control of enterprise Exchange Servers to spread large amounts of spam aimed at signing people up for bogus subscriptions.