NodeStealer 2.0 takes over Facebook Business accounts and targets crypto wallets
Researchers spotted a Python variant of the NodeStealer that was designed to take over Facebook business accounts and cryptocurrency wallets. Palo Alto...
Researchers spotted a Python variant of the NodeStealer that was designed to take over Facebook business accounts and cryptocurrency wallets. Palo Alto...
Aug 01, 2023THNCryptocurrency / Malware Cybersecurity researchers have unearthed a Python variant of a stealer malware NodeStealer that's equipped to...
Researchers warn that threat actors started exploiting Citrix ShareFile RCE vulnerability CVE-2023-24489 in the wild. Citrix ShareFile is a widely...
Researchers have just published a paper showing how to automate the discovery of prompt injection attacks. They look something like...
Jul 27, 2023THNLinux / Endpoint Security Cybersecurity researchers have disclosed two high-severity security flaws in the Ubuntu kernel that could...
Wiz researchers discovered two Linux vulnerabilities in the Ubuntu kernel that can allow an unprivileged local user to gain elevated...
Researchers this month uncovered a two-year-old Linux-based remote access trojan dubbed AVrecon that enslaves Internet routers into botnet that bilks...
Dutch security researchers have disclosed a collection of vulnerabilities in the TETRA protocol used in emergency services, military, infrastructure and...
Checkmark researchers have uncovered the first known targeted OSS supply chain attacks against the banking sector. In the first half of...
Jul 24, 2023THNSupply Chain / Cyber Attack Cybersecurity researchers said they have discovered what they say is the first open-source...
Researchers reported that more than 15000 Citrix servers exposed online are likely vulnerable to attacks exploiting the vulnerability CVE-2023-3519. The...
Researchers warn of several DDoS botnets exploiting a critical flaw tracked as CVE-2023-28771 in Zyxel devices. Fortinet FortiGuard Labs researchers...
SentinelOne researchers attribute the recent supply chain attacks on JumpCloud to North Korea-linked threat actors. JumpCloud is a cloud-based directory...
Cybersecurity researchers discovered a new peer-to-peer (P2P) worm called P2PInfect that targets Redis servers. Palo Alto Networks Unit 42 researchers have discovered...
Jul 20, 2023THNMalware / Cyber Threat Cybersecurity researchers have uncovered a new cloud targeting, peer-to-peer (P2P) worm called P2PInfect that...