As part of this year’s latest “Patch Tuesday” Microsoft. fixed 49 vulnerabilities, among which the developers have also patched two 0-day vulnerabilities, and attackers have already exploited one of which. the...
Author - Emma Davis
A New InTheBox Marketplace for Mobile Malware Operators Was Found on the Darknet
Resecurity specialists spoke about the new InTheBox marketplace, which is focused on mobile malware operators. site has been operating on the darknet since the beginning of 2020 and offers buyers more than 400 custom web...
Vulnerabilities in AMI MegaRAC Controllers Threaten AMD, ARM, HPE and Dell Servers
Experts discovered three vulnerabilities at once in the AMI MegaRAC BMC (Baseboard Management Controller) software from American Megatrends. The issues affect server hardware used by many data centers and cloud service providers...
Residential Proxy Service BlackProxies Is Gaining Popularity among Cybercriminals
Security researchers from DomainTools have discovered a new BlackProxies residential proxy service, which, according to advertising, sells access to a million proxy addresses around the world. warn that BlackProxies is quickly...
Samsung, LG and Mediatek Certificates Are Used to Sign Android Malware
It was found that the certificates that Android OEM manufacturers Samsung, LG and Mediatek use to sign basic system applications were also used to sign malware. me remind you that we also wrote that Hackers stole Mimecast...
Micro-loan Apps with 15 Million Installs Extorted Money from Users
Lookout found more than 280 microloan apps on the Google Play Store and App Store that extorted money from users. these applications, users could take out a loan, but in reality, the applications collected personal data from the...
Researchers Find over 1,600 Malicious Images on Docker Hub
Sysdig experts have found that more than 1,600 images on Docker Hub demonstrate various malicious behaviors. They can hide cryptocurrency miners, built-in secrets that can be used as backdoors, DNS compromise malware, and website...
Data from 5.4 Million Twitter Users Leaked
The data of 5.4 million Twitter users was stolen using an API vulnerability (fixed in January of this year) is now posted for free on a hacker forum. The leaked data includes both public information and phone numbers with email...
Mali GPU Driver Vulnerabilities Threaten Millions of Devices
Google Project Zero experts are alarming, becvause five vulnerabilities in the ARM Mali GPU driver remain unpatched on a variety of devices, although the chipmaker released patches several months ago. As a result, millions of...
Instead of Cobalt Strike, Hackers an Can Use Nighthawk
Experts from Proofpoint have released a report on Nighthawk, an advanced C2 framework that hackers can start using instead of Cobalt Strike. observing how the framework was used by a certain red team in September 2022, the...