Security News

Phishers Can Bypass Multi-Factor Authentication with Microsoft Edge WebView2

Phishers Can Bypass Multi-Factor Authentication with Microsoft Edge WebView2

An information security expert known as mr.d0x has developed a new attack technique that abuses Microsoft Edge WebView2 applications to…

Conti vs. LockBit 2.0 – a Trend Micro Research in Brief

Trend Micro, a Japanese IT security company, has published a thorough comparison of behaviors of two major ransomware groups: Conti…

Conti Ransomware Shutdown, Site Disabled

Conti operators shut down the remnants of the public infrastructure. Two servers on the Tor network that were used to…

Copyright Claims Used as Bait by LockBit 2.0 Affiliates in Korea

A new type of email-bait has been invented by the affiliates of LockBit 2.0. Specialists at AhnLab Inc, a South…

WiFi-Hacking by Neighbours is Rampant in the UK, Research Says

WiFi-Hacking by Neighbours is Rampant in the UK, Research Says

WiFi-Hacking by Neighbors is Rampant in the UK, Research Says The research by a broadband Internet provider Konnect showed that more than 4 million Brits possess the experience of hacking…

Nine Web Scammers Arrested by Dutch Police in a Europol Operation

Nine Web Scammers Arrested by Dutch Police in a Europol Operation

Nine Internet scammers arrested in the Netherlands during Dutch-Belgian joint operation Belgium and the Netherlands have conducted a Europol-supported operation to neutralize a group of cybercriminals. Malefactors made millions of…

Russian Hackers Use Follina Vulnerability to Attack Users in Ukraine

Russian Hackers Use Follina Vulnerability to Attack Users in Ukraine

The Ukraine Computer Emergency Response Team (CERT-UA) said Russian hackers are exploiting the Follina vulnerability in new phishing campaigns to install CredoMap malware and Cobalt Strike beacons. According to experts,…

New DFSCoerce PoC Exploit Allows Attackers to Take Over Windows Domains

New DFSCoerce PoC Exploit Allows Attackers to Take Over Windows Domains

The recently published DFSCoerce PoC exploit uses the MS-DFSNM file system to take over Windows domains. This exploit is conceptually similar to the sensational PetitPotam attack. Let me remind you…

A Former Amazon Employee Charged for Digital Fraud. Sentencing in September

A Former Amazon Employee Charged for Digital Fraud. Sentencing in September

Paige Thompson Faces up to 20 Years for Wire Fraud Paige Thompson, 36, a resident of Seattle, who worked as an engineer in Amazon Web Services, has been charged with…

Cisco Won’t Fix an RCE Vulnerability in Old RV Routers

Cisco Won’t Fix an RCE Vulnerability in Old RV Routers

A 9.8/10 RCE Vulnerability in Old Cisco RV Routers Will Not Be Patched Cisco will not patch the zero-day CVE-2022-20825 vulnerability on end-of-life devices. The affected devices are Small Business…

Microsoft Has Already Patched a Vulnerability in Windows RDP Twice

Microsoft Has Already Patched a Vulnerability in Windows RDP Twice

This week, CyberArk researchers shared technical information about a named pipe RDP (Remote Desktop Protocol) vulnerability in Windows, for which Microsoft had to release two patches. The RCE vulnerability CVE-2022-21893…

QNAP Warns Clients About DeadBolt Ransomware Attacks

QNAP Warns Clients About DeadBolt Ransomware Attacks

DeadBolt Ransomware: Another Instance of Ransomware Evolution On June 17, QNAP, the Taiwanese hardware manufacturer, warned its customers about ransomware attacks targeting the company’s NAS (network-connected storage) devices. Following attacks…

SYMBIOTE Backdoor and Rootkit Dropper Revealed

SYMBIOTE Backdoor and Rootkit Dropper Revealed

Symbiote Backdoor: a Stealthy and Highly Evasive Linux Malware Researchers at Blackberry and Intezer have revealed a malignant program dubbed Symbiote used to inject rootkits and backdoors into compromised Linux…