Category

Brand Abuse

Brand Abuse Page 1

D-Link Router Vulnerabilities Moobot Botnet Operators Mirai DDOS

D-Link router vulnerabilities eyed by Moobot operators

The variant of the Mirai botnet called Moobot has reemerged in a new threat campaign that aims at the D-Link Router vulnerabilities. Based on reports, the botnet targets the old and the new flaws in D-Link routers. According to researchers, the attacks resurfaced in August, but it has not made any suspicious activities notable to...
Continue Reading
Security Flaw Dahua IP Cameras Hackers Spy ONVIF Vulnerability

A security flaw in Dahua’s IP cameras allows hackers to spy

Research shows that a vulnerability in Dahua’s Open Network Video Interface Forum or ONVIF standard implementation can allow attackers to take over the tech brand’s IP cameras. With a CVSS score of 7.4, the vulnerability tracked as CVE-2022-30563 could be exploited to compromise companies’ network cameras by reusing an unencrypted ONVIF interaction and replaying its...
Continue Reading
Windows 7 Calculator Software Exploit QBot Malware Sideloading Cyberattacks

Windows Calculator exploited by the QBot malware for sideloading attacks

QBot malware operators have been abusing the Windows Calculator to execute a sideloading attack to distribute malicious payloads on targeted devices. DLL sideloading campaign is an attack tactic that manipulates how the Dynamic Link Libraries are operated in Windows. The tactic includes impersonating DLL and keeping it in a folder from where the OS loads...
Continue Reading
Nvidia Brand Abuse Scammers Fake Giveaway Fraud Prevention Fraudsters Fake Websites

Nvidia brand used by scammers to conduct a fake giveaway

Fraudsters exploit a computer graphics processor firm Nvidia to conduct a fake giveaway scam to steal cryptocurrency funds from their targets that bite the bait. A report stated that the scammers are abusing the 30th anniversary of the firm by luring its targets with a 50,000 BTC free giveaway. Based on a recent analysis, the...
Continue Reading
Spectre BTI Branch Target Injection Cyberttack Campaign Retbleed Hardware Vulnerability AMD Intel

A new Spectre-BTI campaign dubbed Retbleed was discovered

Intel and AMD chips are yet to be prone to another Spectre-based speculative execution called the Retbleed campaign. Based on reports, both impacted companies have started releasing several threat mitigation measures to prevent the new threat campaign from infecting their customers’ chips. According to a research group, the threat actors could abuse two newly discovered...
Continue Reading
Linux OrBit Malware Stealing Information Threat Intelligence

Linux’s new OrBit malware is used for stealing information

Threat actors have used a new Linux malware called OrBit to steal information from Linux systems elusively. Moreover, the new malware is utilised to infect all operating processes on the compromised devices. The researchers first spotted the malware in a recent campaign. It hijacks shared archives to intercept function calls by creating changes to the...
Continue Reading

Microsoft has successfully patched the ShadowCoerce vulnerability

Microsoft has patched a previously known critical vulnerability called ShadowCoerce, which enables threat actors to target Windows servers in NTLM relay attacks. Malicious entities can use the NTLM relay attack technique to force outdated servers to authenticate against servers that the threat actors control. This method could lead to a complete takeover of the victim’s...
Continue Reading
Honda Cars Keyless Exposed Vulnerability Hack Rolling Pwn Attack

Modern Honda cars get exposed to a hack dubbed Rolling Pwn Attack

Numerous modern Honda car models could risk getting hacked, as researchers had recently identified a vulnerability that allows threat actors to unlock the doors of affected cars or start their engines remotely. The vulnerability is widely known as the ‘Rolling Pwn Attack’ that activates replay attacks that aid hackers in intercepting codes from a keyfob...
Continue Reading
Mitel MiVoice VoIP Appliances Exploited Vulnerability RCE Flaw Zero Day

Mitel MiVoice VoIP Appliances got exploited due to an RCE flaw

Malicious threat groups have exploited a zero-day vulnerability on Mitel MiVoice VoIP appliances operated via Linux Operating System. Researchers said that the threat actors exploited the flaw to acquire initial access to an attempted ransomware campaign. Based on a published threat advisory, the zero-day flaw is a remote code execution (RCE) vulnerability tracked as CVE-2022-29499....
Continue Reading
ToddyCat APT Hacker Group MS Exchange Servers Vulnerability Abuse

The ToddyCat APT group hacked MS Exchange Servers

The ToddyCat advanced persistent threat (APT) group is reported to target the MS Exchange servers of several organisations based in Europe and Asia. The campaign has been in operation for at least a couple of years, allowing researchers to dissect the campaign. The APT group has upgraded their attacks and is now scanning for flawed...
Continue Reading
1 2 3 10