Security
Headlines
HeadlinesLatestCVEs

Tag

#backdoor

CVE-2022-34501: code execution backdoor · Issue #2 · Gmiller290488/bin_collection

The bin-collection package in PyPI before v0.1 included a code execution backdoor inserted by a third party.

CVE
#backdoor
CVE-2022-34983: scu-captcha

The scu-captcha package in PyPI v0.0.1 to v0.0.4 included a code execution backdoor inserted by a third party.

CVE-2022-34982: eziod

The eziod package in PyPI before v0.0.1 included a code execution backdoor inserted by a third party.

CVE-2022-34981: code execution backdoor · Issue #1 · UPB-SS1/PyCrowdTangle

The PyCrowdTangle package in PyPI before v0.0.1 included a code execution backdoor inserted by a third party.

CVE-2022-34509: code execution backdoor · Issue #1 · tford9/Wiki-Faces-Downloader

The wikifaces package in PyPI v1.0 included a code execution backdoor inserted by a third party.

OctoBot WebInterface 0.4.3 Remote Code Execution

OctoBot WebInterface version 0.4.3 suffers from a remote code execution vulnerability.

Mysterious, Cloud-Enabled macOS Spyware Blows Onto the Scene

The CloudMensis spyware, which can lift reams of sensitive information from Apple machines, is the first Mac malware observed to exclusively rely on cloud storage for C2 activities.

Cybercrime Group TA4563 Targets DeFi Market With Evolving Evilnum Backdoor

The cyber campaign, aimed at siphoning funds, uses an improved version of the malware, which can adjust infection paths based on recognized antivirus software.

Hackers Use Evilnum Malware to Target Cryptocurrency and Commodities Platforms

The advanced persistent threat (APT) actor tracked as Evilnum is once again exhibiting signs of renewed activity aimed at European financial and investment entities. "Evilnum is a backdoor that can be used for data theft or to load additional payloads," enterprise security firm Proofpoint said in a report shared with The Hacker News. "The malware includes multiple interesting components to evade

Hackers Target Ukrainian Software Company Using GoMet Backdoor

A large software development company whose software is used by different state entities in Ukraine was at the receiving end of an "uncommon" piece of malware, new research has found. The malware, first observed on the morning of May 19, 2022, is a custom variant of the open source backdoor known as GoMet and is designed for maintaining persistent access to the network. "This access could be