PlugX Trojan Disguised as Legitimate Windows Debugger Tool in Latest AttacksThe PlugX remote access trojan has been observed masquerading as an open source Windows debugger tool called x64dbg...
PureCrypter Malware Targets Government Entities in Asia-Pacific and North America
PureCrypter Malware Targets Government Entities in Asia-Pacific and North AmericaGovernment entities in Asia-Pacific and North America are being targeted by an unknown threat actor with an...
ChromeLoader Malware Targeting Gamers via Fake Nintendo and Steam Game Hacks
ChromeLoader Malware Targeting Gamers via Fake Nintendo and Steam Game HacksA new ChromeLoader malware campaign has been observed being distributed via virtual hard disk (VHD) files,...
Shocking Findings from the 2023 Third-Party App Access Report
Shocking Findings from the 2023 Third-Party App Access ReportSpoiler Alert: Organizations with 10,000 SaaS users that use M365 and Google Workspace average over 4,371 additional connected...
Researchers Share New Insights Into RIG Exploit Kit Malware’s Operations
Researchers Share New Insights Into RIG Exploit Kit Malware's OperationsThe RIG exploit kit (EK) touched an all-time high successful exploitation rate of nearly 30% in 2022,...
LastPass Reveals Second Attack Resulting in Breach of Encrypted Password Vaults
LastPass Reveals Second Attack Resulting in Breach of Encrypted Password VaultsLastPass, which in December 2022 disclosed a severe data breach that allowed threat actors to access...
CISA Issues Warning on Active Exploitation of ZK Java Web Framework Vulnerability
CISA Issues Warning on Active Exploitation of ZK Java Web Framework VulnerabilityThe U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added a high-severity flaw affecting the ZK Framework...
APT-C-36 Strikes Again: Blind Eagle Hackers Target Key Industries in Colombia
APT-C-36 Strikes Again: Blind Eagle Hackers Target Key Industries in ColombiaThe threat actor known as Blind Eagle has been linked to a new campaign targeting various...
Application Security vs. API Security: What is the difference?
Application Security vs. API Security: What is the difference?As digital transformation takes hold and businesses become increasingly reliant on digital services, it has become more important...
New EX-22 Tool Empowers Hackers with Stealthy Ransomware Attacks on Enterprises
New EX-22 Tool Empowers Hackers with Stealthy Ransomware Attacks on EnterprisesA new post-exploitation framework called EXFILTRATOR-22 (aka EX-22) has emerged in the wild with the goal...
Bitdefender Releases Free Decryptor for MortalKombat Ransomware Strain
Bitdefender Releases Free Decryptor for MortalKombat Ransomware StrainRomanian cybersecurity company Bitdefender has released a free universal decryptor for a nascent file-encrypting malware known as MortalKombat. MortalKombat is a...
Parallax RAT Targeting Cryptocurrency Firms with Sophisticated Injection Techniques
Parallax RAT Targeting Cryptocurrency Firms with Sophisticated Injection TechniquesCryptocurrency companies are being targeted as part of a new campaign that delivers a remote access trojan called...
New National Cybersecurity Strategy: What Do You Need to Know?
New National Cybersecurity Strategy: What Do You Need to Know?The White House released a new national cybersecurity strategy this past week with five pillars. What’s in...
Personal data [G Temp]
Personal data [G Temp]The post Personal data [G Temp] appeared first on Click Armor. The post Personal data [G Temp] appeared first on Security Boulevard. Read...
Key Security Wins 2022: Securing the Future
Key Security Wins 2022: Securing the FutureSecurity is becoming more and more important and this is reflected in measures and initiatives many governments and companies are...
Cyberattacks hit data centers to steal information from global companies
Cyberattacks hit data centers to steal information from global companiesCyberattacks targeting multiple data centers in several regions globally have been observed over the past year and...
Credential Stuffing attack on Chick-fil-A impacted +71K users
Credential Stuffing attack on Chick-fil-A impacted +71K usersAmerican fast-food restaurant chain Chick-fil-A reported that the accounts of over 71K users were compromised as a result of...
FTC to ban BetterHelp from sharing mental health data with advertisers
FTC to ban BetterHelp from sharing mental health data with advertisersThe Federal Trade Commission (FTC) has proposed to ban the online counseling service BetterHelp from sharing...
Microsoft is testing a modern Windows 11 volume mixer
Microsoft is testing a modern Windows 11 volume mixerMicrosoft is testing a new and modern-looking Windows 11 volume mixer accessible via the taskbar Quick Settings panel...
How to prevent Microsoft OneNote files from infecting Windows with malware
How to prevent Microsoft OneNote files from infecting Windows with malwareThe seemingly innocuous Microsoft OneNote file has become a popular file format used by hackers to...
Ciberdelincuentes atacan a bufetes de abogados con el malware GootLoader y FakeUpdates
Ciberdelincuentes atacan a bufetes de abogados con el malware GootLoader y FakeUpdatesSeis bufetes de abogados diferentes fueron atacados en enero y febrero de 2023 como parte...
Vulnerabilidad crítica en Oracle WebLogic (CVE-2023-21839)
Vulnerabilidad crítica en Oracle WebLogic (CVE-2023-21839)Se ha publicado el código de explotación para una vulnerabilidad crítica en Oracle WebLogic Server. La vulnerabilidad, identificada como CVE-2023-21839 […]Leer...
Informe anual de seguridad del Browser Security revela los principales riesgos y puntos ciegos de la navegación
Informe anual de seguridad del Browser Security revela los principales riesgos y puntos ciegos de la navegaciónComo interfaz de trabajo principal, el navegador juega un papel...
Cisco parcha falla crítica de Web UI RCE en múltiples teléfonos IP
Cisco parcha falla crítica de Web UI RCE en múltiples teléfonos IPCisco ha abordado una vulnerabilidad de seguridad crítica que se encuentra en la interfaz de...
La Agencia de Ciberseguridad de EE.UU. da la voz de alarma sobre las capacidades letales de Royal Ransomware
La Agencia de Ciberseguridad de EE.UU. da la voz de alarma sobre las capacidades letales de Royal RansomwareLa Agencia de Seguridad de Infraestructura y Ciberseguridad de...
Vulnerabilidad crítica en Oracle WebLogic (CVE-2023-21839)
Vulnerabilidad crítica en Oracle WebLogic (CVE-2023-21839)Se ha publicado el código de explotación para una vulnerabilidad crítica en Oracle WebLogic Server. La vulnerabilidad, identificada como CVE-2023-21839 […]Leer...
2023 Browser Security Report Uncovers Major Browsing Risks and Blind Spots
2023 Browser Security Report Uncovers Major Browsing Risks and Blind SpotsAs a primary working interface, the browser plays a significant role in today's corporate environment. The...
Clustering Phishing Campaign’s Rogue and Fraudulent and Malicious Hosting Infrastructure Pointing to Massive IPFS Web 3.0 Hosting Infrastructure Abuse – An OSINT Analysis
Clustering Phishing Campaign’s Rogue and Fraudulent and Malicious Hosting Infrastructure Pointing to Massive IPFS Web 3.0 Hosting Infrastructure Abuse – An OSINT Analysis Dear blog readers,...
USENIX Security ’22 – Jiaheng Zhang , Tiancheng Xie, Thang Hoang, Elaine Shi, Yupeng Zhang – ‘Polynomial Commitment with a One-to-Many Prover and Applications’
USENIX Security ’22 – Jiaheng Zhang , Tiancheng Xie, Thang Hoang, Elaine Shi, Yupeng Zhang – ‘Polynomial Commitment with a One-to-Many Prover and Applications’Our thanks to...
Autonomous Vehicles Need No Drugs Or Drink To Be Bad Drivers
Autonomous Vehicles Need No Drugs Or Drink To Be Bad DriversHumans often get cited for being influenced by drugs or alcohol when they make terrible decisions....




























