ClickCease Cybersecurity News Archives - Page 49 of 52 - TuxCare

LofyGang distributes 199 trojanized NPM...

The software security company Checkmarx has uncovered the malicious activities of the threat actor LofyGang, which distributes trojanized and typosquatted packages on the NPM open source repository. Security researchers discovered...

Hackers actively exploit critical Bitbucket...

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added a Bitbucket Server RCE and two Microsoft Exchange zero-days to its list of exploited vulnerabilities. The Bitbucket flaw is a...

Chaos malware targets multiple...

According to researchers from Lumen-based Black Lotus Lab, a new Chaos malware is targeting multiple architectures to spread DDoS, cryptocurrency miners, and install backdoors. The malware is written in Go...

Malware campaign exploits Microsoft vulnerability...

Cisco Talos researchers have uncovered a social engineering malware campaign that exploits a remote code execution flaw in Microsoft Office to apply a Cobalt Strike beacon on compromised victims. The...

Microsoft Exchange zero-day flaws expose...

Microsoft has announced that two critical vulnerabilities in its Exchange application are being exploited by attackers. The company also explained that more than 22,000 servers worldwide are affected. “​​At this...

New Metador APT takes aim...

A new malware, identified as Metador, is being used by attackers to target telecommunications, internet service providers and universities on multiple continents, according to security researchers at SentinelOne. “The operators...

Hackers compromise GitHub accounts with...

GitHub warns that cyber attackers are compromising user accounts through a sophisticated phishing campaign. The malicious messages notify users that their CircleCI session has expired and that it is imperative...

New ransomware tool uses unique...

Threat actors are now updating the data exfiltration tool Exmatter with a unique data corruption feature, which attackers could switch to perform ransomware attacks in the future. The new unique...

Attackers exploit Sophos’ firewall code...

Sophos has warned that attackers are exploiting a critical code injection security vulnerability in the company’s Firewall product. The attackers are exploiting the flaw in the wild. The vulnerability is...

Hackers target Microsoft SQL servers...

Microsoft SQL servers are being targeted with FARGO ransomware according to AhbLab Security Emergency Response Center (ASEC) researchers. MS-SQL servers are considered database management systems that store data for internet...

Webworm hackers use Windows-based RATs for...

A threat actor identified as Webworm is using Windows-based remote access trojans for cyber espionage. The Symantec Threat Hunter team identified cases where the attacker targeted an IT service provider...

Mail

Join

4,500

Linux & Open Source
Professionals!

Subscribe to
our newsletter