Security
Headlines
HeadlinesLatestCVEs

Tag

#backdoor

The Next Generation of Supply Chain Attacks Is Here to Stay

With the proliferation of interconnected third-party applications, new strategies are needed to close the security gap.

DARKReading
#vulnerability#web#microsoft#git#backdoor#auth
Step-by-Step Security Guide for WordPress

By Waqas The most prominent CMS today is WordPress which is being used by over 455 million across the globe. This is a post from HackRead.com Read the original post: Step-by-Step Security Guide for WordPress

TrojanOrders Attack Hits Magento and Adobe Stores

By Deeba Ahmed According to researchers, at least seven magecart groups are targeting Magento 2 websites in TrojanOrders attacks. This is a post from HackRead.com Read the original post: TrojanOrders Attack Hits Magento and Adobe Stores

TMI Tech: How to Stop Vulnerable Software from 'Oversharing'

Stop chatty apps from oversharing and eliminate a hacker backdoor — train developers on "security first" while subjecting APIs to least-privilege zero-trust policies.

North Korean Hackers Targeting Europe and Latin America with Updated DTrack Backdoor

Hackers tied to the North Korean government have been observed using an updated version of a backdoor known as Dtrack targeting a wide range of industries in Germany, Brazil, India, Italy, Mexico, Switzerland, Saudi Arabia, Turkey and the U.S. "Dtrack allows criminals to upload, download, start or delete files on the victim host," Kaspersky researchers Konstantin Zykov and Jornt van der Wiel

China-Based Billbug APT Infiltrates Certificate Authority

Access to digital certificates would allow the Chinese-speaking espionage group to sign its custom malware and skate by security scanners.

Researchers Say China State-backed Hackers Breached a Digital Certificate Authority

A suspected Chinese state-sponsored actor breached a digital certificate authority as well as government and defense agencies located in different countries in Asia as part of an ongoing campaign since at least March 2022. Symantec, by Broadcom Software, linked the attacks to an adversarial group it tracks under the name Billbug, citing the use of tools previously attributed to this actor. The

Backdoor.Win32.RemServ.d MVID-2022-0655 Remote Command Execution

Backdoor.Win32.RemServ.d malware suffers from a remote command execution vulnerability.

Worok Hackers Abuse Dropbox API to Exfiltrate Data via Backdoor Hidden in Images

A recently discovered cyber espionage group dubbed Worok has been found hiding malware in seemingly innocuous image files, corroborating a crucial link in the threat actor's infection chain. Czech cybersecurity firm Avast said the purpose of the PNG files is to conceal a payload that's used to facilitate information theft. "What is noteworthy is data collection from victims' machines using

The Hunt for the FTX Thieves Has Begun

Mysterious crooks took hundreds of millions of dollars from FTX just as it collapsed. Crypto-tracing blockchain analysis may provide an answer.