New Linux Malware GTPDOOR Targets Telecom Networks
Linux malware GTPDOOR infiltrates telecom networks. Uses GPRS Tunnelling Protocol for covert control. Recommendations for telecom industry security issued.
Cyber Swindlers Harness DNS Tricks in “Savvy Seahorse” Scam
"Savvy Seahorse" operation uses DNS manipulation. Targets victims with multilingual fraudulent bots. Urges a DNS role reassessment in cybersecurity.
New Year, New Kali: Kali Linux 2024.1 Debuts with Fresh Updates and Tools for Ethical Hackers
Kali Linux 2024.1 brings new hacking tools and updates. New Micro Mirror CDN improves distribution and bandwidth. Download or upgrade…
Millions of WordPress Sites at Risk Due to LiteSpeed Cache Plugin XSS Vulnerability
Critical XSS vulnerability found in LiteSpeed Cache plugin. Flaw affects over 4 million WordPress websites worldwide. Immediate update to patched…
Ransom Demanded After Cyberattack Paralyzes Chicago Children’s Hospital
Chicago children's hospital suffers ransomware attack. Rhysida group demands $3.4 million in Bitcoin as ransom. Healthcare sector's vulnerability to cyber…
Weaponized PDFs Target Online Ticketing Systems in Malware Campaign
Weaponized PDFs spark malware campaign against ticketing systems. Embedded scripts in PDFs trigger downloads of remote access tools. Advanced malware…
Russian Law Enforcement Takes Down Notorious SugarLocker Cyber Gang
Russian officials arrest three SugarLocker members. SugarLocker's RaaS operation exploited RDP vulnerabilities. Case emphasizes global crackdown on ransomware threats.
International Task Force Dismantles Lockbit Ransomware Group with a Touch of Irony
Lockbit ransomware group faces international crackdown. Authorities troll hackers, seizing servers and making arrests. Operation showcases global commitment to cybercrime…
Wireless Chargers Under Attack: New Security Risks Exposed
Wireless chargers vulnerable to interference attacks. Research presents VoltSchemer method exploiting flaws. Noise suppression could mitigate security risks.
North Korean Cyber Groups Target International Military Tech
North Korean groups target defense tech globally. DPRK-linked LAZARUS group uses advanced cyber tactics. Agencies recommend comprehensive cybersecurity measures.