Europe Page 1

Critical RCE Flaw Vulnerability Business Routers DrayTek Hardware Exploit

A critical RCE flaw impacted several business routers of DrayTek

A critical unauthenticated RCE (remote code execution) flaw has impacted 29 models of DrayTek’s business routers in the Vigor series, tracked as CVE-2022-32548 with a CVSS score of 10. Reports reveal that user interaction and credentials are unnecessary for a threat actor to exploit the flaw. Attackers could easily perform attacks against the impacted business...
Continue Reading
Imitated Apps Fake Installer Hackers Cybercrime Malware Distribution Cracked Software

Imitated apps rate has risen as hackers used them for cybercrimes

The latest study about cybercriminals’ use of imitated apps to propagate cybercrime revealed that there had been an identified increase in these malicious activities as time passed. Since people have trusted many applications in their daily lives online, cybercriminals leverage it also to execute their ill-intended plans. One of the most deployed tactics is threat...
Continue Reading
Phishing Operation Strategy Ransomware Threat Groups DNS Online Security Fraud Prevention

New phishing operation borrows strategy from ransomware groups

Researchers released an advisory about threat actors that employ a new phishing operation, which attempts to pressure their targets into making a quick decision. This advisory shows threat actors devising new techniques to make their illegal activities more profitable. According to reports, this credential stealing campaign has been discovered by researchers recently, portraying itself as...
Continue Reading
Gas Pipeline Creos Black Cat Ransomware Hacker Gang

Gas pipeline firm Creos gets hit by the BlackCat ransomware gang

A new cyberattack was performed by the notorious ALPHV (aka BlackCat) ransomware gang after they claimed the attack against a European electricity and gas pipeline firm Creos Luxembourg S.A. As reported by the firm’s owner and operator, Encevo, the attack transpired last July 25. The gas pipeline firm had not suffered operational disruptions, although the...
Continue Reading
Adrastea Hacking Group Data Leak Breach Vulnerability Cyberattack MBDA Missile System

Adrastea hacking group claimed the attack against MBDA

The Adrastea hacking group claimed they had hacked a massive Europe-based multinational missile manufacturer called MBDA. The company came to be after three of Europe’s biggest missile systems firms merged. These three distinct companies are from France (Aerospatiale), the United Kingdom (BAE Systems), and Italy (Finmeccanica). According to analysts, the threat actors that represent Adrastea...
Continue Reading
Semikron Germany Ransomware Attack Network Disruption Semiconductor LV Ransomware Group

Semikron disclosed a ransomware attack against its network

A Germany-based semiconductor manufacturing firm Semikron shared in a recent report about a ransomware attack that compromised and encrypted their network. Semikron is one of the major power engineering manufacturers worldwide, implying the massive effect of the issue on its operations. With more than 3,000 staff across different countries, such as Brazil, China, France, and...
Continue Reading
Lightning Framework Malware Threat Linux OS Open Source Typosquatting Cybersecurity

Lightning Framework, the newest malware threat for Linux OS

Researchers eyeing devices that utilise Linux operating systems have spotted the Lightning Framework malware. Based on reports, this malware was unknown to many until a research group analysed a sample rootkit. The newly discovered framework can be used to backdoor machines that employ SSH and spread several types of rootkits. Moreover, Lightning Framework forms modular...
Continue Reading
Attackers Developers Impersonation GitHub Commits Metadata Supply Chain Attack Vulnerability

Attackers target developers by impersonating GitHub Commits metadata

A cybersecurity expert has published an advisory regarding a newly emerged supply chain attack method in which threat actors use fake Commits metadata to authenticate compromised GitHub archives. The researchers explained that “Commits” are a critical part of the GitHub system and contain a unique ID or hash. Additionally, the purpose of these parts in...
Continue Reading
ASUS Gigabyte Motherboard CosmicStrand Malware Hardware Vulnerability UEFI Rootkit Chinese Hackers

ASUS and Gigabyte motherboards carried CosmicStrand malware

Cybersecurity researchers have spotted the CosmicStrand malware inside the devices of Gigabyte and ASUS motherboards. CosmicStrand is a new strain of UEFI rootkit that is becoming a trend among China-based threat groups. Chinese-speaking threat actors utilised the well-known rootkit since at least 2016 to infect targets in Russia, China, Iran, and Vietnam. CosmicStrand has been...
Continue Reading
Ukraine Backdoor Malware GoMet GoLang Russia Threat Actors Hacker

Ukraine suffers from another set of backdoor dubbed GoMet

A peculiar malware backdoor called GoMet has been utilised by threat actors in a campaign that targets big-time Ukrainian software development firms. Cybersecurity researchers firmly believe that these new attacks came from Russia and were executed by its state-sponsored threat groups. GoMet is a standard piece of software coded in the Go programming language (Golang)...
Continue Reading
1 2 3 33