SIEM as a Service
Home Search

RDP - search results

If you're not happy with the results, please do another search

North Korean Hackers Use Custom-Made RDP Wrapper To Activate Remote Desktop on Hacked Machines

Cybersecurity experts have uncovered a sophisticated campaign by North Korea's Kimsuky group, employing a custom-built RDP Wrapper to gain unauthorized access to compromised machines. This...

TAG-124 Hacked 1000+ WordPress Sites To Embed Payloads

A sophisticated cyber campaign orchestrated by the threat group TAG-124 has compromised over 1,000 WordPress websites to deploy malicious payloads. The operation leverages a multi-layered...

Hackers Use 10,000 WordPress Sites To Deliver Malware To macOS and Microsoft Systems

A sophisticated cyberattack has compromised over 10,000 WordPress websites, delivering cross-platform malware to unsuspecting users. The campaign exploits outdated WordPress versions and plugins, redirecting visitors...

Hackers Exploit RDP Protocol To Gain Windows Access To Control Browser Remotely

Cybercriminals have been exploiting vulnerabilities in the Remote Desktop Protocol (RDP) to gain unauthorized access to Windows systems and remotely control web browsers. This method...

WordPress Real-Estate Plugin Vulnerability Exposes 32k+ Websites To Cyberattack

A severe security flaw has been discovered in the popular RealHomes WordPress theme and its accompanying plugin, Easy Real Estate, threatening the security of...
New Credit Card Skimmer Attacking WordPress Checkout Pages To Steal Payment Card Data

New Skimmer Malware Hijacking WordPress Websites to Steal Credit Cards

A sophisticated credit card skimmer malware had been found hitting WordPress checkout pages, silently injecting malicious JavaScript into database records to obtain sensitive payment...
New WordPress Plugin That Weaponizes Legit Sites To Steal Customer Payment Data

WordPress Plugin Weaponizes Legit Sites To Steal Customer Payment Data

PhishWP, a newly discovered WordPress plugin, is being used by cybercriminals to maliciously convert legitimate websites into phishing traps, putting user data at risk. Cybercriminals...
Earth Koshchei Hackers Using Red Team Tools To Attack RDP Servers

Earth Koshchei Hackers Using Red Team Tools To Attack RDP Servers

A sophisticated cyber espionage campaign leveraging red team tools to exploit Remote Desktop Protocol (RDP) servers has been uncovered, with the threat actor Earth...
WordPress Site vulnerability

RCE Vulnerability in 1,000,000 WordPress Sites Lets Attackers Gain Control Over Backend

A critical Remote Code Execution (RCE) vulnerability (CVE-2024-6386), affecting over 1,000,000 active installations of the WordPress Multilingual Plugin (WPML). This flaw, stemming from a Server-Side...
Red Team Tools in RDP Attacks

Hackers Leverage Red Team Tools in RDP Attacks Via TOR & VPN for Data...

In a striking display of cyber sophistication, the advanced persistent threat (APT) group Earth Koshchei, also tracked as APT29 or Midnight Blizzard, has been...
SIEM as a Service

Recent Posts

Software Supply Chain

Researchers Hacked into Software Supply Chain and Earned $50K Bounty

Researchers found a significant software supply chain vulnerability, which resulted in an outstanding $50,500 bounty from a major corporation's bug bounty program. The duo’s success...