Security
Headlines
HeadlinesLatestCVEs

Tag

#pdf

New Bandook RAT Variant Resurfaces, Targeting Windows Machines

A new variant of remote access trojan called Bandook has been observed being propagated via phishing attacks with an aim to infiltrate Windows machines, underscoring the continuous evolution of the malware. Fortinet FortiGuard Labs, which identified the activity in October 2023, said the malware is distributed via a PDF file that embeds a link to a password-protected .7z archive. “

The Hacker News
#mac#windows#git#pdf#The Hacker News
Mitsubishi Electric Factory Automation Products

View CSAF 1. EXECUTIVE SUMMARY CVSS v3 7.5 ATTENTION: Exploitable remotely/low attack complexity Vendor: Mitsubishi Electric Equipment: Multiple Factory Automation Products Vulnerabilities: Observable Timing Discrepancy, Double Free, Access of Resource Using Incompatible Type ('Type Confusion') 2. RISK EVALUATION Successful exploitation of these vulnerabilities could disclose information in the product or could cause denial-of-service (DoS) condition. 3. TECHNICAL DETAILS 3.1 AFFECTED PRODUCTS The following Factory Automation products are affected: GT SoftGOT2000: Versions 1.275M to 1.290C (CVE-2023-0286) OPC UA Data Collector: Versions 1.04E and prior (CVE-2023-0286) MX OPC Server UA (Software packaged with MC Works64): Versions 3.05F and later (Packaged with MC Works64 Version 4.03D and later) (CVE-2022-4304) OPC UA Server Unit: All versions (CVE-2022-4304) FX5-OPC: Versions 1.006 and prior (CVE-2022-4304, CVE-2022-4450) 3.2 Vulnerability Overview 3.2.1 OBSERVABLE TIMING DISCREPANCY ...

Microsoft disables ms-appinstaller after malicious use

Microsoft decided to disable App Installer links by default after it noticed several access brokers using the handler to spread malware.

Microsoft Disables MSIX App Installer Protocol Widely Used in Malware Attacks

Microsoft on Thursday said it’s once again disabling the ms-appinstaller protocol handler by default following its abuse by multiple threat actors to distribute malware. “The observed threat actor activity abuses the current implementation of the ms-appinstaller protocol handler as an access vector for malware that may lead to ransomware distribution,” the Microsoft Threat Intelligence

Operation RusticWeb: Rust-Based Malware Targets Indian Government Entities

Indian government entities and the defense sector have been targeted by a phishing campaign that's engineered to drop Rust-based malware for intelligence gathering. The activity, first detected in October 2023, has been codenamed Operation RusticWeb by enterprise security firm SEQRITE. "New Rust-based payloads and encrypted PowerShell commands have been utilized to exfiltrate

MOKOSmart MKGW1 Gateway Improper Session Management

MOKOSmart MKGW1 Gateway devices with firmware version 1.1.1 or below do not provide an adequate session management for the administrative web interface. This allows adjacent attackers with access to the management network to read and modify the configuration of the device.

Biggest Data Security Threats for Businesses: Strategies to Strengthen Your Defense

By Waqas With cybercriminals continuously evolving their strategies to target sensitive data with sophisticated attacks, data security has become a… This is a post from HackRead.com Read the original post: Biggest Data Security Threats for Businesses: Strategies to Strengthen Your Defense

2024 Trends for Securing Your Business Premises: Essential Strategies and Technologies

By Waqas As you look ahead to 2024, the landscape of physical security is evolving rapidly, with new trends emerging… This is a post from HackRead.com Read the original post: 2024 Trends for Securing Your Business Premises: Essential Strategies and Technologies

Navigating eSIM Policies and Regulations

By Owais Sultan eSIM technology is a promising innovation that offers a number of benefits over traditional SIM cards. This is a post from HackRead.com Read the original post: Navigating eSIM Policies and Regulations

5 Fraud Prevention Strategies That Help Companies Ward Off Cyber Attacks

By Owais Sultan Building a successful business is no small feat. You pour your heart and soul into it – serving… This is a post from HackRead.com Read the original post: 5 Fraud Prevention Strategies That Help Companies Ward Off Cyber Attacks