/f/threats

Black Basta behind aggressive US-based malware campaign _cybernews.com
| posted in rouiejay12 No comments |
1

Octocrypt, Alice, and AXLocker Ransomware, new threats in the wild _securityaffairs.co
| posted in rouiejay12 No comments |
1

Enterprise healthcare providers warned of Lorenz ransomware threat _scmagazine.com
| posted in rouiejay12 No comments |
1

Autonomous Vehicles Join the List of US National Security Threats _wired.com
| posted in rouiejay12 No comments |
1

Phishing Kit Uses Novel URI Fragmentation Technique in Pre-Holiday Campaigns _sensorstechforum.com
| posted in rouiejay12 No comments |
1

Insider Threats and Indicators to Watch Out For _tripwire.com
| posted in rouiejay12 No comments |
1

DEV-0569 Ransomware Group Remarkably Innovative, Microsoft Cautions _darkreading.com
| posted in rouiejay12 No comments |
1

New improved versions of LodaRAT spotted in the wild _securityaffairs.co
| posted in rouiejay12 No comments |
1

Thanksgiving con artists lurking in consumer inboxes, analyst warns _cybernews.com
| posted in rouiejay12 No comments |
1

Emerging Threat Actor DEV-0569 Expands Its Toolkit to Deliver Royal Ransomware _infosecurity-magazine.com
| posted in rouiejay12 No comments |
1

Smart Home Hubs Leave Users Vulnerable to Hackers _homelandsecuritynewswire.com
| posted in rouiejay12 No comments |
1

Black Friday and retail season – watch out for PayPal “money request” scams _nakedsecurity.sophos.com
| posted in rouiejay12 No comments |
1

Warning: New RapperBot Campaign Aims to Launch DDoS Attacks at Game Servers _thehackernews.com
| posted in rouiejay12 No comments |
1

Forbes: Vulnerability Backlogs Are A Dangerous Time Suck _securityboulevard.com
| posted in rouiejay12 No comments |
1

Networking Tech Vulnerability Could Be Used to Hack Spacecraft: Researchers _securityweek.com
| posted in rouiejay12 No comments |
1

Using AI as an offensive cyber weapon _blog.avast.com
| posted in rouiejay12 No comments |
1

Ransomware on Healthcare Organisations cost Global Economy $92 bn _itsecurityguru.org
| posted in rouiejay12 No comments |
1

Researchers Sound Alarm on Dangerous BatLoader Malware Dropper _darkreading.com
| posted in rouiejay12 No comments |
1

New Extortion Scam Threatens Victims with Data Leak _heimdalsecurity.com
| posted in rouiejay12 No comments |
1

Previously undetected Earth Longzhi APT is a subgroup of APT41 _securityaffairs.co
| posted in rouiejay12 No comments |
1

Cobalt Strike malware cannot be stopped with a single line of defense, analyst warns _cybernews.com
| posted in rouiejay12 No comments |
1

Google Pixel Lock Screen Bypass Let Attacker Unlock Screen _gbhackers.com
| posted in rouiejay12 No comments |
1

CSRF in Plesk API enabled server takeover _portswigger.net
| posted in rouiejay12 No comments |
1

Dangerous SIM-swap lockscreen bypass – update Android now! _nakedsecurity.sophos.com
| posted in rouiejay12 No comments |
1

Malicious droppers on Google Play deliver banking malware to victims _helpnetsecurity.com
| posted in rouiejay12 No comments |
1

New phishing campaign posing as Spain's Tax Agency _blog.avast.com
| posted in rouiejay12 No comments |
1

Advanced RAT AgentTesla Most Prolific Malware in October _infosecurity-magazine.com
| posted in rouiejay12 No comments |
1

Malicious Python Package Relies on Steganography to Download Malware _darkreading.com
| posted in rouiejay12 No comments |
1

Malicious proof-of-concepts are exposing GitHub users to malware and more _portswigger.net
| posted in rouiejay12 No comments |
1

CVE ALERT! OpenSSL CVE-2022-3786 and CVE-2022-3602: X.509 Email Address Buffer Overflows _securityboulevard.com
| posted in rouiejay12 No comments |
1

Predator wiretapping: Intellexa continues its business undisturbed in Greece _en.secnews.gr
| posted in rouiejay12 No comments |
1

Juniper JunOS RCE Flaw Let Remote Attacker Execute Code _gbhackers.com
| posted in rouiejay12 No comments |
1

Kioxia warns of potential cost of US chip policy over China _theregister.com
| posted in rouiejay12 No comments |
1

Samsung Galaxy Store flaw could have allowed installing malicious apps on target devices _securityaffairs.co
| posted in rouiejay12 No comments |
1

Accused ‘Raccoon’ Malware Developer Fled Ukraine After Russian Invasion _krebsonsecurity.com
| posted in rouiejay12 No comments |
1

Chinese Hackers Using New Stealthy Infection Chain to Deploy LODEINFO Malware _thehackernews.com
| posted in rouiejay12 No comments |
1

RomCom RAT Distributed as Spoofed Versions of Popular IP Scanning Tool _gbhackers.com
| posted in rouiejay12 No comments |
1

Microsoft Event Log vulnerabilities threaten some Windows operating systems _csoonline.com
| posted in rouiejay12 No comments |
1

Raspberry Robin Worm Actors Linked to Clop, LockBit Ransomware Groups _infosecurity-magazine.com
| posted in rouiejay12 No comments |
1

Cryptomining campaign abused free GitHub account trials _en.secnews.gr
| posted in rouiejay12 No comments |
1