Category cyber-attacks

Renowned Video Editing Software Website Breached to Distribute Banking Trojan

Title: VSDC Multimedia Editing Software Compromised, Users Targeted by Banking Trojan In a recent cybersecurity incident, the official website of VSDC, a widely used free video editing and conversion tool, was compromised, leading to the distribution of malware to unsuspecting users. The breach, first reported by Dr. Web, reveals that…

Read MoreRenowned Video Editing Software Website Breached to Distribute Banking Trojan

Encrypted Messaging Project “Matrix” Faces Major Cyber Attack

Matrix Cyber Attack: A Major Breach in Secure Messaging Matrix, an organization behind an open-source protocol for secure and decentralized real-time communication, recently fell victim to a significant cyber attack. Intruders managed to infiltrate the servers that host the official Matrix website and various datasets, leading to serious security repercussions.…

Read MoreEncrypted Messaging Project “Matrix” Faces Major Cyber Attack

Scranos: Newly Uncovered Spyware Featuring Rapidly Evolving Rootkit Capabilities

A sophisticated spyware campaign utilizing a rootkit has come to light, wherein cybercriminals disseminate multifunctional malware masquerading as legitimate cracked software or as trojanized applications, often mimicking popular video players, drivers, and even antivirus tools. Known as Scranos, this rootkit malware was initially identified late last year and continues to…

Read MoreScranos: Newly Uncovered Spyware Featuring Rapidly Evolving Rootkit Capabilities

8 WhatsApp Features to Enhance Your Security and Privacy

WhatsApp, one of the world’s leading messaging applications, boasts a staggering user base exceeding 3 billion. However, its extensive reach has also made it a prime target for cybercriminals. Recently, researchers uncovered a new form of account hijacking termed “GhostPairing,” allowing attackers to link their browsers to unsuspecting users’ WhatsApp…

Read More8 WhatsApp Features to Enhance Your Security and Privacy

Karkoff: The New ‘DNSpionage’ with a Focused Targeting Approach

Recent investigations reveal that the cybercriminal organization behind the notorious DNSpionage malware campaign has initiated a new operation, deploying a sophisticated variant of DNSpionage to target chosen victims. Initially uncovered in November, the DNSpionage attacks exploited compromised websites and malicious documents to infiltrate systems with a custom remote administrative tool,…

Read MoreKarkoff: The New ‘DNSpionage’ with a Focused Targeting Approach

Hackers Exploit Oracle WebLogic RCE Vulnerability to Distribute Ransomware

Cybercriminals increasingly exploit newly disclosed vulnerabilities, making this one of the primary vectors for threats such as crypto-mining, phishing, and ransomware. Recently, a critical vulnerability in the Oracle WebLogic Server, a widely utilized enterprise application platform, has been actively targeted in the wild. Researchers have identified this exploit as distributing…

Read MoreHackers Exploit Oracle WebLogic RCE Vulnerability to Distribute Ransomware

How to Safeguard Your iPhone or Android Device Against Spyware

Recent findings have unveiled alarming trends in the cybersecurity landscape, particularly in the emergence of spyware that exploits seemingly innocuous applications and tools. Richard LaTulip, a field Chief Information Security Officer at Recorded Future, highlights that infections often initiate through malicious links or counterfeit applications, but increasingly, they are being…

Read MoreHow to Safeguard Your iPhone or Android Device Against Spyware