Tag
#chrome
By Asheer Malhotra and Vitor Ventura. Cisco Talos recently discovered a new attack framework called "Manjusaka" being used in the wild that has the potential to become prevalent across the threat landscape. This framework is advertised as an imitation of the Cobalt Strike framework. The implants for the new malware family are written in the Rust language for Windows and Linux. A fully functional version of the command and control (C2), written in GoLang with a User Interface in Simplified Chinese, is freely available and can generate new implants with custom configurations with ease, increasing the likelihood of wider adoption of this framework by malicious actors. We recently discovered a campaign in the wild using lure documents themed around COVID-19 and the Haixi Mongol and Tibetan Autonomous Prefecture, Qinghai Province. These maldocs ultimately led to the delivery of Cobalt Strike beacons on infected endpoints. We have observed the same threat actor using the Cobalt Strike beac...
PyroCMS v3.9 was discovered to contain multiple cross-site scripting (XSS) vulnerabilities.
"Bruggling" emerges as a novel technique for pilfering data out from a compromised environment — or for sneaking in malicious code and attack tools.
This week on Lock and Code, we talk with some of the team behind Malwarebytes Labs about whether we've lost the fight for data privacy. The post Have we lost the fight for data privacy? Lock and Code S03E16 appeared first on Malwarebytes Labs.
Categories: Podcast Tags: Data privacy Tags: facebook Tags: Google Tags: lock and code Tags: lock and code podcast Tags: malwarebytes labs Tags: podcast This week on Lock and Code, we talk with some of the team behind Malwarebytes Labs about whether we've lost the fight for data privacy. (Read more...) The post Have we lost the fight for data privacy? Lock and Code S03E16 appeared first on Malwarebytes Labs.
Keep your logins locked down with our favorite apps for PC, Mac, Android, iPhone, and web browsers.
Plus: A Google Chrome patch licks the DevilsTongue spyware, Android’s kernel gets a tune-up, and Microsoft fixes 84 flaws.
Plus: Google delays the end of cookies (again), EU officials were targeted with Pegasus spyware, and more of the top security news.
A threat actor operating with interests aligned with North Korea has been deploying a malicious extension on Chromium-based web browsers that's capable of stealing email content from Gmail and AOL. Cybersecurity firm Volexity attributed the malware to an activity cluster it calls SharpTongue, which is said to share overlaps with an adversarial collective publicly referred to under the name
D-Link DSL-3782 v1.03 and below was discovered to contain a stack overflow via the function getAttrValue.