Hackers Exploit New Social Engineering to Deploy Malware
Hackers employ new social engineering to run PowerShell scripts. Techniques include obfuscated scripts and browser injects. Continuous user education is…
OPIX Ransomware Encrypts Files with Random Strings
OPIX ransomware encrypts files using random character strings. Victims must contact attackers within 48 hours to avoid data leaks. Maintaining…
Empire Market Operators Face Federal Charges in Chicago
Two men charged for operating Empire Market, a dark web marketplace. They facilitated over $430 million in illegal transactions from…
VMware Identifies Critical Vulnerabilities in vCenter Server
VMware issues advisory VMSA-2024-0012 for vCenter Server. Vulnerabilities include heap overflow and local privilege escalation. Timely patches released; immediate application…
Chinese Hackers Target F5 Load Balancers
Chinese hackers exploited F5 load balancers for two years. Attackers used sophisticated techniques like DLL hijacking and PlugX malware. Effective…
Analysts Identify SolarMarker Malware in Bing Searches
SolarMarker targets Bing users searching for team-building activities. Attack involved a fake Indeed website to deploy the malware payload. Continuous…
NHS Ransomware Attack Disrupts Blood Tests and Operations
A ransomware attack on Synnovis disrupted NHS blood test processing. Over 800 operations and 700 outpatient appointments were canceled. Recovery…
Total Fitness Data Breach Exposes Sensitive Images
Unprotected database exposed 474,651 images from Total Fitness. Images included sensitive information like passports and credit cards. Total Fitness audited…
Arid Viper Targets Android Users with Malicious Apps
Arid Viper targets Android users in the Middle East. Trojanized apps mimic popular services and collect personal data. AridSpy's evolution…
Microsoft Addresses Wi-Fi Driver Vulnerability in June Patch
Microsoft patched a critical Wi-Fi driver flaw in June Patch Tuesday. The vulnerability, CVE-2024-30078, poses a high risk of remote…