Security
Headlines
HeadlinesLatestCVEs

Tag

#windows

Windows Users Beware: Crooks Relying on SeroXen RAT to Target Gamers

By Deeba Ahmed Currently, SeroXen RAT is delivered either via phishing emails or Discord channels. This is a post from HackRead.com Read the original post: Windows Users Beware: Crooks Relying on SeroXen RAT to Target Gamers

HackRead
#windows#git#botnet#ssl
Ask Fitis, the Bear: Real Crooks Sign Their Malware

Code-signing certificates are supposed to help authenticate the identity of software publishers, and provide cryptographic assurance that a signed piece of software has not been altered or tampered with. Both of these qualities make stolen or ill-gotten code-signing certificates attractive to cybercriminal groups, who prize their ability to add stealth and longevity to malicious software. This post is a deep dive on "Megatraffer," a veteran Russian hacker who has practically cornered the underground market for malware focused code-signing certificates since 2015.

Menorah Restaurant 1.0.0 Insecure Settings

Menorah Restaurant version 1.0.0 appears to leave default credentials installed after installation.

Acelle Email Marketing 3.0.15 Arbitrary File Upload

Acelle Email Marketing version 1.0 suffers from an arbitrary file upload vulnerability.

Online Security Guards Hiring System 1.0 Cross Site Scripting

Online Security Guards Hiring System version 1.0 suffers from a cross site scripting vulnerability.

New Horabot campaign targets the Americas

Cisco Talos has observed a threat actor deploying a previously unidentified botnet program Talos is calling “Horabot,” which delivers a known banking trojan and spam tool onto victim machines in a campaign that has been ongoing since at least November 2020.

How Wazuh Improves IT Hygiene for Cyber Security Resilience

IT hygiene is a security best practice that ensures that digital assets in an organization's environment are secure and running properly. Good IT hygiene includes vulnerability management, security configuration assessments, maintaining asset and system inventories, and comprehensive visibility into the activities occurring in an environment. As technology advances and the tools used by

Bumsys Business Management System 1.0.3-beta Shell Upload

Bumsys Business Management System version 1.0.3-beta suffers from a remote shell upload vulnerability.

N. Korean ScarCruft Hackers Exploit LNK Files to Spread RokRAT

Cybersecurity researchers have offered a closer look at the RokRAT remote access trojan that's employed by the North Korean state-sponsored actor known as ScarCruft. "RokRAT is a sophisticated remote access trojan (RAT) that has been observed as a critical component within the attack chain, enabling the threat actors to gain unauthorized access, exfiltrate sensitive information, and potentially

CVE-2022-4333

Hardcoded Credentials in multiple SPRECON-E CPU variants of Sprecher Automation allows an remote attacker to take over the device. These accounts should be deactivated according to Sprecher's hardening guidelines.