The Second Exploit in Ivanti EPMM in a Week
Ivanti has once again encountered an error that affects and corrects its Endpoint Manager software. This is despite the fact that Ivanti had eliminated a zero-day vulnerability that targeted the…
Predasus Malware Attacks Latin America Through Browser Plugins
Latin America has been hit by cyberattacks using malicious Google Chrome extensions. Attackers targeted financial institutions, booking sites, and instant messaging. Malware used in this attacks was dubbed Predasus. Predasus…
Infostealers: How to Detect, Remove and Prevent them?
The flow of information is crucial in today's world, but it's also precious to cybercriminals. They target personal data stored on your device through infostealer malware, putting your information at…
GameOver(lay) Vulnerabilities Endanger 40% of Ubuntu Users
Cloud security researchers have discovered two easily exploitable privilege escalation vulnerabilities called GameOver(lay) in the Ubuntu OverlayFS module. These vulnerabilities could affect 40% of Ubuntu users. What is OverlayFS? OverlayFS…
Google Is Working on an Information Security Project Called Web Integrity API
A team of four Google engineers is working on a new project called the Web Environment Integrity API, which will allow sites to block client applications that change their code.…
Decoy Dog Malware Uncovered: Next-Gen Spyware
A group of hackers, presumably state-sponsored, is actively developing and beginning to use a sophisticated Decoy Dog toolkit. It has likely been used for over a year in cyber intelligence…
FraudGPT Offers Phishing Email Generation to Cybercriminals
It's not just IT companies racing to develop AI-powered chatbots. Cybercriminals have also joined the fray. Recent reports indicate that a developer has built a dangerous AI chatbot called "FraudGPT"…
Google Creates a Red Team to Attack AI Systems
Google says it is creating a red team that will specialize in "sophisticated technical attacks on AI systems." Among examples of such attacks, the company's report lists prompt engineering, extracting…
Information Security Threats in Social Media
Social media has become an important aspect of our everyday lives in this age of technology and information. Despite its numerous advantages, social media has raised concerns about protecting personal…
Ivanti 0-day exploited to target Norwegian government
Software development company Ivanti (formerly MobileIron Core) has patched a zero-day vulnerability that allowed authentication bypass. This vulnerability had a maximum CVSS level and was actively exploited to gain unauthorized…
Luca Stealer Spreads Via a Phishing Microsoft Crypto Wallet Site
With the ever-increasing number of cyber threats, hackers and cybersecurity specialists are taking the initiative. This time, cybercriminals went ahead of the curve. They created a phishing website to coincide…
Trojan HotRat Is Distributed through Pirated Versions of Software and Games
Avast experts have warned that a new variant of AsyncRAT malware, called HotRat, is distributed through pirated versions of popular programs and utilities. This includes games, Microsoft Office, and audio…