Deployed WezRat Malware known to Execute Attackers Commands

Cyber researchers discovered on a new remote access trojan and information stealer used by Iranian state-sponsored actors to conduct reconnaissance of compromised endpoints and execute malicious commands. The malware was first documented late last month by U.S. and Israeli cybersecurity agencies, describing it as an “exploitation tool for gathering information about an end point and running remote…

Read More

“Nastiest Malware List of 2024, Unveiled by OpenText Cybersecurity

OpenText has revealed its highly anticipated “Nastiest Malware of 2024” list, spotlighting the year’s most notorious cyber threats. In its seventh year, OpenText’s cybersecurity experts have identified the most relentless and adaptive malware trends impacting industries worldwide. This year, ransomware aimed at critical infrastructure takes center stage, highlighting an urgent call for reinforced security to…

Read More

Indian education sector, an area for Soft Target by Cyber Criminals; Check Point Study

Indian education sector faces unprecedented surge in cyberattacks – Over 8,000 weekly attacks, double the global average: Check Point This stark contrast underscores the heightened vulnerability of Indian organisations in the face of escalating cyber threats. Check Point Software Technologies Ltd. has unveiled finding of its latest Threat Intelligence Report for the last 6 months…

Read More

Water Sigbin Hackers Exploit Oracle WebLogic Vulnerabilities

Cybersecurity researchers uncovered a sophisticated attack campaign by the Water Sigbin (aka 8220 Gang) threat actor that exploited vulnerabilities in the Oracle WebLogic Server, notably CVE-2017-3506 and CVE-2023-21839, to deploy the XMRig cryptocurrency miner on compromised systems.   The attack begins with the threat actor exploiting the WebLogic vulnerabilities to execute a malicious PowerShell script on the victim…

Read More

Hackers Backdoored Courtroom Video Recording Software With System Hijacking Malware

Hackers Backdoored Courtroom Video Recording Software With System Hijacking Malware Courtroom software hijacked discovered by researchers of Rapid7 A vulnerability (CVE-2024-4978) has been identified in JAVS Viewer v8.3.7, a critical component for managing digital recordings in legal and government environments.  The installer for this version is backdoored, allowing attackers to remotely seize control of infected…

Read More

Have you Noticed Job’s Adds Roaming Around Facebook; Beaware of Ov3r_Stealer’ Malware

Recently as I was going through my Facebook , I noticed that lot of job advertisement for various position mainly account manager. As I applied they send back queries asking for mobile number and What’s Up messages. Researchers first discovered the stealer in early December. It was being spread via a Facebook job advertisement for…

Read More

No, 3 million Electric Toothbrushes were not used in a DDoS Attack; Hypothetical Attack

3 million electric toothbrushes were hacked with malware to conduct distributed denial of service (DDoS) attacks is likely a hypothetical scenario instead of an actual attack, said a publication. The published a story stated that an employee of cyber security firm Fortinet said 3 million electric toothbrushes had been infected with Java malware to conduct DDoS…

Read More

Zscaler ThreatLabz Finds Most Cyberattacks Hide In Encrypted Traffic

Zscaler finds malware, which includes malicious web content and malware payloads, continued to dominate over other types of encrypted attacks, with ad spyware sites and cross-site scripting accounting for 78% of all blocked attacks. Research analyzed nearly 30 billion blocked threats from October 2022 to September 2023 by the Zscaler Zero Trust Exchange platform, the…

Read More