Atomic and Exodus Crypto Wallets Targeted in Malicious NPM Package Campaign

The new NPM package, pdf-to-office, masquerades as a utility for converting PDF files to Word documents. Instead, it injects malicious code into cryptocurrency wallet software associated with Atomic Wallet and Exodus.

Sapphire Werewolf Upgrades Arsenal With Amethyst Stealer Targeting Energy Firms

Sapphire Werewolf has introduced a potent new weapon into its cyber arsenal, unveiling the latest iteration of the Amethyst stealer in a calculated phishing attack against an energy firm.

Emulating the Misleading CatB Ransomware

CatB ransomware, also known as CatB99 or Baxtoy, emerged in late 2022 and has gained attention for its use of DLL hijacking via MSDTC to execute its payload. It is suspected to be a rebrand of Pandora ransomware.

Dell Addresses Security Vulnerabilities in PowerScale OneFS

Dell has released a security advisory addressing multiple vulnerabilities in PowerScale OneFS, its scale-out network-attached storage operating system. The vulnerabilities could be exploited by malicious users to compromise affected systems.

SonicWall Patches Multiple Vulnerabilities in NetExtender VPN Client

SonicWall has issued a security advisory disclosing three newly identified vulnerabilities in its NetExtender Windows client, a popular VPN tool used by organizations for secure remote access to internal networks.

AI-Powered AkiraBot Bypasses CAPTCHAs, Spams Websites At Scale

AkiraBot is designed to post AI-generated spam messages in chats, comments, and contact forms, tailored to the targeted website’s content to promote dubious Search Engine Optimization (SEO) services such as Akira and ServicewrapGO..

SureTriggers Vulnerability Exposes 100,000+ WordPress Sites to Full Takeover

A critical vulnerability in the popular WordPress automation plugin SureTriggers has exposed over 100,000 sites to the risk of unauthenticated administrative account creation, potentially allowing full site takeover.

CISA Warns of Two Actively Exploited Linux Kernel Vulnerabilities

The vulnerabilities, CVE-2024-53197 and CVE-2024-53150, are part of a sophisticated zero-day exploit chain allegedly used by digital forensics vendor Cellebrite and Serbian law enforcement to unlock confiscated Android devices.

Seven Years Later, Cisco Smart Install Flaw Still Exposes Thousands to RCE

Despite being disclosed seven years ago, the Cisco Smart Install Remote Code Execution (RCE) flaw remains active in the wild, with over 1,200 Cisco devices still exposing the vulnerable service to the internet.

New TCESB Malware Found in Active Attacks Exploiting ESET Security Scanner

A Chinese-affiliated threat actor known for its cyber-attacks in Asia has been observed exploiting a security flaw in security software from ESET to deliver a previously undocumented malware codenamed TCESB.

Defend Against Threats with Cyber Fusion

Cyware is the leading provider of cyber fusion solutions that power threat intelligence sharing , end-to-end automation and 360-degree threat response.

Trending Tags