Hackread

Hackers Exploiting Linux eBPF to Spread Malware in Ongoing Campaign

Cybercriminals use eBPF rootkits to conceal their presence and drop remote access trojans capable of tunnelling traffic and maintaining communication within private networks.

Dell Urges Immediate Update to Fix Critical Power Manager Vulnerability

A high-severity access control flaw in Dell Power Manager allows privilege escalation. Attackers with local access can execute arbitrary code, bypass security measures, and compromise system confidentiality, integrity, and availability.

New DCOM Attack Exploits Windows Installer for Backdoor Access

Cybersecurity researchers at Deep Instinct have uncovered a novel and powerful Distributed Component Object Model (DCOM) based lateral movement attack method that enables attackers to stealthily deploy backdoors on target Windows systems.

Fake Betting Apps Using AI-Generated Voices to Steal Data

Cybercriminals are creating fake betting app ads to lure users and steal money and personal information. Over 500 fake ads and 1,377 malicious sites have been identified, targeting users in regions like Egypt, the Middle East, Europe, and Asia.

Malware Bypasses Microsoft Defender and 2FA to Steal $24K in Crypto

Cybersecurity researchers at SafetyDetectives revealed that Microsoft Defender, the default Windows antivirus, was deceived by malware, enabling the theft of cryptocurrency from an unsuspecting user.

Zero-day Flaws Exposed EV Chargers to Shutdowns and Data Theft

The vulnerabilities, rated as high and medium severity, could allow unauthorized access, disruption of charger operations, and privilege escalation for limited users. Exploiting these vulnerabilities could lead to remote code execution.

Trojan.AutoIt.1443 Hits 28,000 Users via Game Cheats, Office Tool

The malware executes tasks to establish network access with Ncat, manipulates the system registry using IFEO, and controls system functions. It conducts cryptomining using SilentCryptoMiner and steals funds by swapping crypto wallet addresses.

Scammers Hit Florida Hurricane Victims with Fake FEMA Claims, Malware Files

Phishing campaigns are using newly registered domains related to hurricane relief efforts to trick victims into revealing sensitive information. Some are posing as FEMA assistance providers on forums like BlackBones to steal personal data and funds.

Lua Malware Targeting Student Gamers via Fake Game Cheats

Morphisec Threat Labs has found advanced Lua malware targeting student gamers and educational institutions, taking advantage of Lua-based gaming engine supplements popular among students.

New PyPI Malware Poses as Crypto Wallet Tools to Steal Private Keys

Checkmarx researchers discovered PyPI malware posing as crypto wallet tools. These malicious packages stole private keys and recovery phrases, targeting wallets like Metamask, Trust Wallet, and Exodus.

Defend Against Threats with Cyber Fusion

Cyware is the leading provider of cyber fusion solutions that power threat intelligence sharing , end-to-end automation and 360-degree threat response.

Trending Tags