2 Min Read LineasDNSon11/12/2023Decoding the Mind of a Cyber Attacker In the ever-evolving cybersecurity landscape, one method stands out for its chilling effectiveness – social engineering. But why does it work…
2 Min Read LineasDNSon11/12/2023New PoolParty Process Injection Techniques Outsmart Top EDR Solutions A new collection of eight process injection techniques, collectively dubbed PoolParty, could be exploited to achieve code execution in Windows…
3 Min Read LineasDNSon09/12/2023New Spectre-based Vulnerability Impacts Intel, AMD, and Arm CPUs Researchers from the Vrije Universiteit Amsterdam have disclosed a new side-channel attack called SLAM that could be exploited to leak…
3 Min Read LineasDNSon09/12/2023Researchers Unveil GuLoader Malware’s Latest Anti-Analysis Techniques Threat hunters have unmasked the latest tricks adopted by a malware strain called GuLoader in an effort to make analysis more challenging.…
3 Min Read LineasDNSon08/12/2023New 5G Modem Flaws Affect iOS Devices and Android Models from Major Brands A collection of security flaws in the firmware implementation of 5G mobile network modems from major chipset vendors such as MediaTek and…
3 Min Read LineasDNSon08/12/2023N. Korea’s Kimsuky Targeting South Korean Research Institutes with Backdoor Attacks The North Korean threat actor known as Kimsuky has been observed targeting research institutes in South Korea as part of a spear-phishing…
4 Min Read LineasDNSon08/12/2023The Growing Threat You Can’t Ignore Ransomware attacks have become a significant and pervasive threat in the ever-evolving realm of cybersecurity. Among the various iterations of…
2 Min Read LineasDNSon08/12/2023New Trojan-Proxy Malware Spreading via Pirated Software Unauthorized websites distributing trojanized versions of cracked software have been found to infect Apple macOS users with a new Trojan-Proxy…
2 Min Read LineasDNSon08/12/2023WordPress Releases Update 6.4.2 to Address Critical Remote Attack Vulnerability WordPress has released version 6.4.2 with a patch for a critical security flaw that could be exploited by threat actors by combining it with…
2 Min Read LineasDNSon08/12/2023Founder of Bitzlato Cryptocurrency Exchange Pleads Guilty in Money-Laundering Scheme The Russian founder of the now-defunct Bitzlato cryptocurrency exchange has pleaded guilty, nearly 11 months after he was arrested in Miami…