Skip to content
GeekWire
  • HOME
  • NEWS
    • CERT
    • EXPLOITS
    • NCSC
    • NVD
    • SECURELIST
    • US-CERT
  • BLOG
    • Books
    • OSINT
    • Pentest
    • Privacy
  • GHDB
  • CHDB
  • OSINT
  • LABS
  • ARCHIVE
  • ABOUT
    • Privacy Policy
    • Terms of Use
    • External Links
    • Sitemap
GeekWire
GeekWire
  • HOME
  • NEWS
    • CERT
    • EXPLOITS
    • NCSC
    • NVD
    • SECURELIST
    • US-CERT
  • BLOG
    • Books
    • OSINT
    • Pentest
    • Privacy
  • GHDB
  • CHDB
  • OSINT
  • LABS
  • ARCHIVE
  • ABOUT
    • Privacy Policy
    • Terms of Use
    • External Links
    • Sitemap

Malware

New AlienFox toolkit harvests credentials for tens of cloud services

31 March 2023

AlienFox is a novel comprehensive toolset for harvesting credentials for multiple cloud service providers, SentinelLabs reported. AlienFox …

Tags Cloud Computing, IT, Malware, New, News

IRS tax forms W-9 email scam drops Emotet malware

30 March 2023

Emotet malware is known for stealing personal data and financial details from a targeted device. The cybersecurity researchers at …

Tags Cyber Attack, Identity Theft, Malspam, Malware, Phishing

Supply chain blunder puts 3CX telephone app users at risk

30 March 2023

Internet telephony company 3CX is warning its customers of malware that was apparently weaseled into the company’s own 3CX Desktop App by …

Tags Github Electron, Malware, Open Source, Open Source Software, Supply

Do you use comms software from 3CX? What to do next after biz hit in supply chain attack

30 March 2023

Two security firms have found what they believe to be a supply chain attack on communications software maker 3CX – and the vendor’s boss …

Tags Desktop Apps, Malware, SentinelOne, Supply Chain Attacks, Supply Chains

Chinese RedGolf Group Targeting Windows and Linux Systems with KEYPLUG Backdoor

30 March 2023

A Chinese state-sponsored threat activity group tracked as RedGolf has been attributed to the use of a custom Windows and Linux backdoor …

Tags Backdoors, Chinese, Chinese Hackers, Linux, Malware

Clipboard-injecting malware disguises itself as Tor browser, steals cryptocurrency

30 March 2023

Imagine you live in Russia and want to use the Tor browser to anonymise your browsing of the web. There’s a …

Tags IT, Malware, News, Tor, Tor Browser

Popular PABX platform, 3CX Desktop App suffers supply chain attack

30 March 2023

SentinelOne has dubbed the attack “Smooth Operator,” while CrowdStrike suspects the involvement of a North Korean government-state …

Tags Desktop Apps, Malware, SentinelOne, Supply Chain Attacks, Supply Chains

3CX Desktop App Supply Chain Attack Leaves Millions at Risk – Urgent Update on the Way!

30 March 2023

3CX said it’s working on a software update for its desktop app after multiple cybersecurity vendors sounded the alarm on what appears to be …

Tags Desktop Apps, IT, Malware, News, Supply Chain Attacks

3CX Desktop App Targeted in Supply Chain Cyber Attack, Affecting Millions of Users

30 March 2023

3CX said it’s working on a software update for its desktop app after multiple cybersecurity vendors sounded the alarm on what appears to be …

Tags Desktop Apps, IT, Malware, News, Supply Chains

Malware disguised as Tor browser steals $400k in cryptocash

30 March 2023

Clipboard-injector malware disguised as Tor browser installers has been used to steal about $400,000 in cryptocurrency from nearly 16,000 …

Tags IT, Malware, News, Tor Browser

Smashing Security podcast #315: Crypto hacker hijinks, government spyware, and Utah social media shocker

29 March 2023

A cryptocurrency hack leads us down a mazze of twisty little passages, Joe Biden’s commercial spyware bill, and Utah gets tough on social …

Tags Crypto, Malware, Podcasts, Privacy, Security Pro

Google reveals spyware attack on Android, iOS, and Chrome

29 March 2023

The primary target of this spyware campaign were the unsuspecting users in Italy, Malaysia, and Kazakhstan. Google’s Threat Analysis …

Tags Apple, Commercials, iOS, Malware, Vendors

Fake Tor Browser Installers Distributing Clipper Malware

29 March 2023

The Clipper malware is notoriously known for stealing cryptocurrency funds and user data from targeted devices. According to Kaspersky …

Tags Browsers, Internet, IT, Malware, Tor

Clipper attacks use Trojanized TOR Browser installers

29 March 2023

Researchers discovered malware-laced installers for the TOR browser that is spreading clipper malware in Russia and Eastern Europe. …

Tags Browsers, Internet, IT, Malware, News
Older posts
Page1 Page2 … Page657 Next →
Cookie-Free

NVD

  • CVE-2023-1753 – Weak Password Requirements in GitHub repository thorsten/phpmyfaq prior to 3.1.12. …31 March 2023
  • CVE-2023-1747 – A vulnerability has been found in IBOS up to 4.5.4 and classified as critical. Affected by …31 March 2023
  • CVE-2023-1754 – Improper Input Validation in GitHub repository thorsten/phpmyfaq prior to 3.1.12. …31 March 2023
  • CVE-2023-28727 – Panasonic AiSEG2 versions 2.00J through 2.93A allows adjacent attackers bypass authenticat …31 March 2023
  • CVE-2023-1759 – Cross-site Scripting (XSS) – Stored in GitHub repository thorsten/phpmyfaq prior to 3.1.12 …31 March 2023
  • CVE-2023-1760 – Cross-site Scripting (XSS) – Stored in GitHub repository thorsten/phpmyfaq prior to 3.1.12 …31 March 2023

EXPLOITS

  • SOUND4 IMPACT/FIRST/PULSE/Eco v2.x – Unauthenticated Factory Reset31 March 2023
  • Judging Management System v1.0 – Authentication Bypass31 March 2023
  • SOUND4 IMPACT/FIRST/PULSE/Eco v2.x – Remote Command Execution (RCE)31 March 2023
  • Bangresto 1.0 – SQL Injection31 March 2023
  • SOUND4 IMPACT/FIRST/PULSE/Eco v2.x – Authentication Bypass31 March 2023
  • Textpattern 4.8.8 – Remote Code Execution (RCE) (Authenticated)31 March 2023

SECURELIST

  • Selecting the right MSSP: Guidelines for making an objective decision30 March 2023
  • Financial cyberthreats in 202229 March 2023
  • Copy-paste heist or clipboard-injector attacks on cryptousers28 March 2023
  • How scammers employ IPFS for email phishing27 March 2023
  • Understanding metrics to measure SOC effectiveness24 March 2023
  • Developing an incident response playbook23 March 2023
Copyright © 2023 GeekWire | Cookie-Free | Privacy Policy | We are not responsible for the content of external sites.
Next Page »