Home Search
RDP - search results
If you're not happy with the results, please do another search
North Korean Hackers Use Custom-Made RDP Wrapper To Activate Remote Desktop on Hacked Machines
Cybersecurity experts have uncovered a sophisticated campaign by North Korea's Kimsuky group, employing a custom-built RDP Wrapper to gain unauthorized access to compromised machines.
This...
TAG-124 Hacked 1000+ WordPress Sites To Embed Payloads
A sophisticated cyber campaign orchestrated by the threat group TAG-124 has compromised over 1,000 WordPress websites to deploy malicious payloads.
The operation leverages a multi-layered...
Hackers Use 10,000 WordPress Sites To Deliver Malware To macOS and Microsoft Systems
A sophisticated cyberattack has compromised over 10,000 WordPress websites, delivering cross-platform malware to unsuspecting users.
The campaign exploits outdated WordPress versions and plugins, redirecting visitors...
Hackers Exploit RDP Protocol To Gain Windows Access To Control Browser Remotely
Cybercriminals have been exploiting vulnerabilities in the Remote Desktop Protocol (RDP) to gain unauthorized access to Windows systems and remotely control web browsers.
This method...
WordPress Real-Estate Plugin Vulnerability Exposes 32k+ Websites To Cyberattack
A severe security flaw has been discovered in the popular RealHomes WordPress theme and its accompanying plugin, Easy Real Estate, threatening the security of...
New Skimmer Malware Hijacking WordPress Websites to Steal Credit Cards
A sophisticated credit card skimmer malware had been found hitting WordPress checkout pages, silently injecting malicious JavaScript into database records to obtain sensitive payment...
WordPress Plugin Weaponizes Legit Sites To Steal Customer Payment Data
PhishWP, a newly discovered WordPress plugin, is being used by cybercriminals to maliciously convert legitimate websites into phishing traps, putting user data at risk.
Cybercriminals...
Earth Koshchei Hackers Using Red Team Tools To Attack RDP Servers
A sophisticated cyber espionage campaign leveraging red team tools to exploit Remote Desktop Protocol (RDP) servers has been uncovered, with the threat actor Earth...
RCE Vulnerability in 1,000,000 WordPress Sites Lets Attackers Gain Control Over Backend
A critical Remote Code Execution (RCE) vulnerability (CVE-2024-6386), affecting over 1,000,000 active installations of the WordPress Multilingual Plugin (WPML).
This flaw, stemming from a Server-Side...
Hackers Leverage Red Team Tools in RDP Attacks Via TOR & VPN for Data...
In a striking display of cyber sophistication, the advanced persistent threat (APT) group Earth Koshchei, also tracked as APT29 or Midnight Blizzard, has been...