Cybersecurity

Thai Officials Targeted in Yokai Backdoor Campaign Using DLL Side-Loading Techniques

î ‚Dec 14, 2024î „Ravie LakshmananMalware / Cyber Threat Thai government officials have emerged as the target of a new campaign that leverages a technique called...

PUMA creeps through Linux with a stealthy rootkit attack

The dropper creates two in-memory executables: /memfd:tgt, a harmless cron binary, and /memfd:wpn, a rootkit loader. The loader evaluates the environment, executes additional...

Germany Disrupts BADBOX Malware on 30,000 Devices Using Sinkhole Action

î ‚Dec 14, 2024î „Ravie LakshmananBotnet / Ad Fraud Germany's Federal Office of Information Security (BSI) has announced that it has disrupted a malware operation called...

390,000+ WordPress Credentials Stolen via Malicious GitHub Repository Hosting PoC Exploits

î ‚Dec 13, 2024î „Ravie LakshmananCyber Attack / Malware A now-removed GitHub repository that advertised a WordPress tool to publish posts to the online content management...

27 DDoS-For-Hire Services Disrupted In Run-Up To Holiday Season

In a co-ordinated international effort, the law enforcement agencies of 15 countries have made the holiday season a little less stressful for companies...

Recent Articles