Content Paint

Intel

Researchers Uncover NonEuclid RAT Leveraging UAC Bypass and AMSI Evasion Tactic

Cybersecurity researchers have identified a sophisticated threat known as NonEuclid, a remote access trojan (RAT) allowing malicious actors to hijack Windows computers. Developed in C#, NonEuclid incorporates advanced techniques to evade detection and gain unauthorized access. **Evasion Techniques** NonEuclid leverages methods such as bypassing antivirus programs and escalating privileges to

New EAGERBEE Variant Targets ISPs and Governments with Sophisticated Backdoor Features

A sophisticated variant of the EAGERBEE malware has been identified, targeting internet service providers and government bodies in the Middle East. This updated version, also known as Thumtais, exhibits enhanced backdoor features that mark a notable advancement in its functionality. Advanced Backdoor Features The new EAGERBEE variant integrates multiple components

UN Aviation Agency Probes Security Breach Following Hacker’s Claim of Data Theft

The International Civil Aviation Organization (ICAO), a United Nations entity setting global aviation standards, is currently investigating a cybersecurity breach. On Monday, ICAO disclosed that it's conducting an active assessment following reports of a possible security incident. The breach is allegedly tied to a known cybercriminal group targeting

Chinese Salt Typhoon Hackers Target 9 US Telecom Firms in Expanding Breaches

Expanded Telecom Breaches Highlight Ongoing Chinese Cyber Threat Recent reports from the Wall Street Journal have surfaced, revealing that telecom giants Charter Communications, Consolidated Communications, and Windstream have fallen victim to the widespread Salt Typhoon hacking campaign attributed to Chinese state-sponsored actors. Growing List of Affected Telecoms The Salt Typhoon

Malicious npm Packages Targeting Ethereum Developers

In a recent cybersecurity development, twenty harmful npm packages posing as parts of the Hardhat development environment have targeted Ethereum developers, aiming to steal private keys and sensitive data. More than a thousand downloads of these packages have been reported, illustrating a significant threat to the community. Targeted Attack on

Chinese APT Exploits BeyondTrust API to Access U.S. Treasury Systems and Documents

The U.S. Treasury Department announced a significant cybersecurity breach attributed to suspected Chinese threat actors, affecting the department’s systems and unclassified documents. The incident was caused by the exploitation of an API key from a third-party service provider, BeyondTrust. Incident Overview On December 8, 2024, BeyondTrust, a software

Apache Addresses Critical SQL Injection Vulnerability in Apache Traffic Control

The Apache Software Foundation (ASF) has released updates to address a severe SQL injection vulnerability in Apache Traffic Control, identified as CVE-2024-45387. Facing a critical Common Vulnerability Scoring System (CVSS) score of 9.9, this flaw impacts the robust Traffic Control solution, which allows operators to establish scalable and distributed

Threat Actors Actively Exploiting Apache Struts Vulnerability CVE-2024-53677

Cybersecurity experts have raised alarms about threat actors exploiting a newly uncovered vulnerability in Apache Struts—labeled CVE-2024-53677. This flaw carries a critical CVSS score of 9.5, underscoring its severity. Exploiting this vulnerability could allow attackers to upload harmful files, leading to potential remote code execution. According to an

Ongoing Phishing Campaign Exploits Google Calendar to Evade Spam Filters

Phishing attacks are evolving as cybercriminals find creative ways to infiltrate user inboxes. A recent campaign is exploiting Google Calendar invites and Google Drawings to deceitfully harvest user credentials while evading spam detection. Platform Abuse The tactic leverages Google Calendar invites, cleverly embedding phishing links within event descriptions or attachments.

Your link has expired. Please request a new one.
Your link has expired. Please request a new one.
Your link has expired. Please request a new one.
Great! You've successfully signed up.
Great! You've successfully signed up.
Welcome back! You've successfully signed in.
Success! You now have access to additional content.