RDP Honeypot Was Attacked 3.5 Million Times
With increased remote work, IT teams use remote access tools to manage company devices and ensure smooth operations. Remote desktop connections are highly attractive to hackers, with an average of…
Information Security Experts Published a PoC Exploit for a Vulnerability in Win32k
Information security experts have published a PoC exploit for a privilege escalation vulnerability in the Win32k driver that was fixed in May. Let me remind you that this bug received…
Oneetx.exe
Oneetx.exe is a malicious process, related to Amadey dropper malware. It can be spectated in the Task Manager, with seemingly nothing suspicious about it – if you don’t know what…
BatCloak’s New Obfuscation Engine Outperforms 80% of Antiviruses
Trend Micro researchers reported recently that since September 2022, attackers have been actively using a malware obfuscation engine called BatCloak, which allows cybercriminals to effectively hide malicious code from antivirus…
Fortinet Fixes RCE Flaws in FortiOS and FortiProxy
Fortinet, a well-known vendor of corporate-grade security solutions, issued an urgent patch that fixes critical vulnerabilities in two products. FortiOS and FortiProxy SSL-VPN were reportedly vulnerable to remote code execution…
Clop Attacks on MOVEit Transfer Affected British Airways, BBC and More
According to security researchers, the Clop ransomware group has been looking for a way to exploit a vulnerability in MOVEit Transfer since 2021. Hackers say hundreds of companies have been…
Third Party Data Breach: Definition and How to Prevent It
In today's digital landscape, data breaches have become an alarming reality for organizations and individuals. The increasing reliance on technology and the widespread collection, storage, and exchange of personal information…
Android Malware Mimics VPN, Netflix and Over 60k of Other Apps
Android is an open operating system. This is an advantage and a disadvantage. Cybersecurity technology experts recently discovered a widespread Android malware campaign. And given the scale of this campaign,…
Beware of Vacation-Related Scams: 4 Most Prevalent Types
Email scam actors constantly try to pick a better disguise for their fraudulent messages. Summer, the time when people commonly plan to take a break from their jobs and travel,…
BlackCat Ransomware New Update Boosts Exfiltration Speed
BlackCat ransomware continues to make a fuss globally for the second year now, targeting various sectors. Most of the time, it goes to healthcare, government, education, manufacturing, and hospitality. The…
Hackers Can Use ChatGPT Hallucinations to Distribute Malicious Packages
According to vulnerability and risk management company Vulcan Cyber, attackers can manipulate ChatGPT to distribute malicious packages to software developers. Let me remind you that we also said that ChatGPT…
What is “Windows Key Code Is Not Valid And Seems Pirated”?
Windows Key Code Is Not Valid And Seems Pirated appears to be a new scary scam approach used to trick Windows users. Banners with this prompt may appear out of…