ClickCease Flaw Archives - Page 3 of 4 - TuxCare

Lazarus hackers exploit Dell driver...

ESET researchers have uncovered the malicious activities of Lazarus, a North Korean hacking group that exploits a Dell hardware driver flaw for Bring Your Own Vulnerable Driver attacks. In order...

Malware campaign exploits Microsoft vulnerability...

Cisco Talos researchers have uncovered a social engineering malware campaign that exploits a remote code execution flaw in Microsoft Office to apply a Cobalt Strike beacon on compromised victims. The...

Microsoft Exchange zero-day flaws expose...

Microsoft has announced that two critical vulnerabilities in its Exchange application are being exploited by attackers. The company also explained that more than 22,000 servers worldwide are affected. “​​At this...

New Metador APT takes aim...

A new malware, identified as Metador, is being used by attackers to target telecommunications, internet service providers and universities on multiple continents, according to security researchers at SentinelOne. “The operators...

Attackers exploit Sophos’ firewall code...

Sophos has warned that attackers are exploiting a critical code injection security vulnerability in the company’s Firewall product. The attackers are exploiting the flaw in the wild. The vulnerability is...

Webworm hackers use Windows-based RATs for...

A threat actor identified as Webworm is using Windows-based remote access trojans for cyber espionage. The Symantec Threat Hunter team identified cases where the attacker targeted an IT service provider...

Bitdefender free decryptor for LockerGoga...

Bitdefender has published a free decryptor, which is supposed to help LockerGoga ransomware victims to restore their files without having to pay a ransom. The decryptor was developed thanks to...

Rockstar Games confirms GTA 6...

A hacker gained access to Rockstar Games’ internal servers and stole 3 GB worth of early GTA 6 footage, photo and source code for the game. The hacker, who was...

Hackers exploit Oracle WebLogic Servers...

Cybersecurity company Trend Micro has uncovered a malware campaign in which threat actors exploit security vulnerabilities in the Oracle WebLogic Server to deliver cryptocurrency mining malware. One of the malware...

Bumblebee Malware Offers a new...

A new version of the Bumblebee malware loader has been discovered by researchers. The new strain of malware offers a new chain of infection, including the use of a PowerScript...

Hackers Actively Exploit WordPress Zero-day...

Wordfence, a WordPress security company, has warned of a zero-day WordPress vulnerability that is now being exploited by attackers. The bug is in a WordPress plugin called BackupBuddy. BackupBuddy is...

Attackers use Watering Hole Attacks...

A China-based threat actor dubbed APT TA423 is carrying out waterhole attacks on domestic Australian organizations and offshore energy companies in the South China Sea to distribute the ScanBox reconnaissance...

Mail

Join

4,500

Linux & Open Source
Professionals!

Subscribe to
our newsletter