SIEM as a Service
Home Search

malicious attacker - search results

If you're not happy with the results, please do another search
UAC Bypass: 3 Methods Used Malware In Windows 11 in 2024

UAC Bypass: 3 Methods Used Malware In Windows 11 in 2024

User Account Control (UAC) is one of the security measures introduced by Microsoft to prevent malicious software from executing without the user's knowledge. However,...
Hackers Attacking Check Point Remote Access VPN Devices to Breach Enterprise Networks

Hackers Attacking Check Point Remote Access VPN Devices to Breach Enterprise Networks

Check Point Software Technologies recently issued an advisory regarding an ongoing campaign by threat actors to breach enterprise networks by targeting Remote Access VPN...
Hackers use the Greatness PaaS tool to Steal Microsoft 365 login credentials

Hackers Using Greatness PaaS tool to Steal Microsoft 365 Login Credentials

A new Phishing-as-a-Service (PaaS) tool called Greatness is being used by cybercriminals to steal Microsoft 365 login credentials. First detected in 2022, Greatness allows...
Threats Actors Delivering Remcos RAT Distributed as UUE (Uuencoding) File

Threats Actors Delivering Remcos RAT Distributed as UUE (Uuencoding) File

AhnLab Security Intelligence Center (ASEC) has confirmed the accuracy of the Remcos RAT malware being distributed through UUE (UUEncoding) files compressed with Power Archiver....
LangChain JS Vulnerability Let Attackers Expose Sensitive Information

LangChain JS Framework Vulnerability Let Hackers Read Arbitrary File on Servers

A security researcher uncovered a high-risk vulnerability in the popular LangChain JS framework that could allow attackers to read arbitrary files on servers running...
Fake Antivirus Websites Malware

Beware of Fake Antivirus Websites Delivering Windows & Android Malware

Fake antivirus websites are now a major cybersecurity threat, spreading malware to both Windows and Android devices. These malicious sites mimic legitimate antivirus solutions from...
Cyber Security News Weekly Round-Up May

Cyber Security News Weekly Round-Up (Vulnerabilities, Cyber Attacks, Threats & New Stories)

To strengthen organizational protections, one must stay up to date with the constantly evolving nature of cybersecurity.  Such a weekly recap of cyber-security news is...
3 Common Cybersecurity Mistakes in Cryptocurrency Trading

3 Common Cybersecurity Mistakes in Cryptocurrency Trading

Cryptocurrency trading can offer substantial returns, but it's also fraught with risks that extend beyond much-publicized market volatility. We are of course talking about...
Hackers Backdoored Courtroom Video Recording Software With System Hijacking Malware

Hackers Backdoored Courtroom Video Recording Software With System Hijacking Malware

A vulnerability (CVE-2024-4978) has been identified in JAVS Viewer v8.3.7, a critical component for managing digital recordings in legal and government environments.  The installer for...
Chinese Hackers Using ORB Proxy Networks For Stealthy Cyber Attacks

Chinese Hackers Using ORB Proxy Networks For Stealthy Cyber Attacks

Researchers found that cyber espionage groups with ties to China are increasingly using complicated proxy networks called Operational Relay Box (ORB) networks. These networks...
SIEM as a Service

Recent Posts