The campaign involves a two-step attack. During the first phase, an email without a malicious payload containing content copied from a legitimate Pakistani newspaper’s article is sent to the target.
This trojan appears to target Mexican organizations. Cisco Talos is tracking these campaigns embedding URLs in the associated droppers, which belong to many major banks in Mexico.
The vulnerability is in a software protocol made by Taiwanese internet of things (IoT) vendor ThroughTek, which has many customers including the Chinese electronics giant Xiaomi.
An attacker could exploit these flaws by sending a specially crafted MP4 file. This could cause an integer overflow eventually resulting in a heap-based buffer overflow that causes memory corruption.
A security vulnerability within the Realtek RTL819xD module allows attackers to gain complete access to the device, installed operating systems, and other network devices.
The company says that it recently learned that DarkSide operators were also able to collect and exfiltrate documents containing personal data of a total of 5,810 individuals during their attack.
El_Cometa ransomware group, formerly known as SynAck, released master decryption keys for the victims they targeted between July 2017 and early 2021. Emsisoft would be creating its own decryption tool that will be easy to use and safe. The tool will be released for public use within a few days.
A cyberattack targeted Israel’s Bar Ilan University Sunday, the school reported. An internal email by the IT department said the attack was ongoing and urged staff to shut down their computers.
Ransomware operators, including Magniber and Vice Society, were found exploiting flaws in Windows Print Spooler to compromise systems and spread laterally across networks.
A group of researchers discovered a new type of code-poisoning attack that can manipulate natural-language modeling systems via a backdoor. By nature, this is a blind attack, in which the attacker does not require to observe the execution of their code or the weights of the backdoored model during or post the training. Staying protected […]