CoinLurker: Next-Generation Tool Used in Modern Cyberattacks

CoinLurker is an advanced data-stealing malware that has revolutionized fake update campaigns. Written in the Go programming language, CoinLurker utilizes obfuscation and anti-analysis techniques, enabling it to evade detection and carry out stealthy cyberattacks. According to Morphisec’s report, CoinLurker has…

Hackers Exploiting Microsoft Teams for Remote Access to Systems

Hackers used the Microsoft Teams platform to trick a victim into granting remote access to their system. This attack, analyzed by Trend Micro, showcases the increasing complexity of social engineering tactics employed by cybercriminals. The attack unfolded in several stages:…

Increased Scanning of RDP Services: Focus on Port 1098

Recent data has revealed a sharp rise in attacks targeting Remote Desktop Protocol (RDP) services, with a specific focus on port 1098 Over the past two weeks, honeypot sensors have recorded more than 740,000 daily scans from distinct IP addresses.…

Security Vulnerability Discovered in Apache Struts

Apache Struts 2, an open-source platform widely used in web applications, has been found to contain a new security vulnerability (CVE-2023-50164). This vulnerability allows attackers to upload and execute malicious files on the server, posing a serious threat to the…

Critical Vulnerability in Windows CLFS Driver: CVE-2024-49138

A newly identified critical vulnerability in the Windows Common Log File System (CLFS) driver — CVE-2024-49138 — poses a serious threat, having already been exploited in cyberattacks. This issue represents a significant risk to Windows systems. Overview of the Vulnerability…

Critical Vulnerabilities in SAP NetWeaver

SAP has released security updates to address critical vulnerabilities discovered in the SAP NetWeaver Application Server for Java. These vulnerabilities, particularly within the Adobe Document Services component, enable attackers to upload malicious PDF files, posing significant threats to corporate data…

Warning About WordPress Security Vulnerability!

A new security vulnerability has been discovered in the Gutentor plugin for WordPress. This issue allows attackers to inject malicious scripts into the site. The script automatically executes whenever a compromised page is opened, posing a significant risk to website…

Skip to content