Chinese users are faced with malicious search ads. These ads mainly plague Baidu search engine, spreading malware by promoting fake freeware downloading pages. Baidu Malvertising Campaign Spreads Backdoors A fresh report reveals...
Author - Emma Davis
Fake Zoom and Google Meet Sites Deliver Malware
Threat actors have used fake websites advertising popular video conferencing software to deliver malware. Frauds particularly mimic Zoom, Google Meet and Skype, and bear on typosquatting techniques. They distributed SpyNote RAT...
Free Rhysida Ransomware Decryptor Published
South Korean researchers have made a significant breakthrough in the fight against ransomware, unveiling a decryption tool that exploits a critical flaw in the encryption algorithm of Rhysida ransomware. However, such a...
Zloader is Back, Possessing New Capabilities & Tricks
An infamous Zloader malware is back, according to the most recent report of malware sandbox ANY.RUN. The researchers not only detected the rise in activity of the before-offline malware, but also managed to analyze the new sample...
TeamCity Critical Vulnerability Uncovered, Update Now
JetBrains recently discovered a critical authentication bypass vulnerability in TeamCity On-Premises servers. This flaw could allow attackers to execute remote code without user interaction, gaining admin privileges on affected...
White Phoenix Decryptor Tool Online Version Released
White Phoenix decryptor receives an upgrade with the online version. CyberArk, the developer, created a convenient web interface – a big step up from the published source code, as it was previously. The decryptor offers to...
Ransomware Victims Keep Refusing to Pay, Researchers Report
Ransomware is losing effectiveness, and victims increasingly refuse to pay the ransom. Specialists have been observing this trend since the middle of 2021, and some factors contribute to it, which we will discuss below...
Critical Jenkins RCE Vulnerability Discovered, Patch ASAP
A new critical vulnerability in Jenkins has surfaced. The vulnerability in an open source automation server allows unauthorized attackers to perform remote code execution (RCE) attacks. As Jenkins is a rather popular basis for a...
XMRig CoinMiner Hides in Cheats for Popular Games
The researchers have uncovered a new-old tactic used by cybercriminals. Frauds are distributing XMRig CoinMiner malware under the guise of cheats for popular games. As using cheats and hacks requires mandatory disabling...
Atlassian Confluence RCE Vulnerability Exploited
In a concerning development, cybersecurity experts have detected active exploits (RCE) flaws in Atlassian Confluence. The vulnerability poses a severe threat due to the possibility of remote code execution. Atlassian has...