Vulnerability

Hackers Exploit New AV/EDR Bypass Tool to Breach Endpoints

The disabler.exe tool, derived from EDRSandBlast source code, targets EDR hooks in user-mode libraries and kernel-mode callbacks and employs a vulnerable driver, wnbios.sys or...

Hackers Set Up 100+ Fake Stores to Steal Millions from Shoppers

Phish 'n' Ships, a sophisticated cyber fraud scheme, exploited multiple website vulnerabilities to host fake product listings, which, strategically optimized for search engines, lured...

Chinese Hackers’ Toolkit and Activity History EXPOSED

A Chinese-speaking threat actor was found exploiting vulnerabilities in South Korean, Chinese, Thai, Taiwanese, and Iranian organizations, where the actor utilized scanning tools like...

Severe SMB Vulnerability Hits All OPA Versions on Windows

The recent OPA update addresses a vulnerability that could have allowed an attacker to extract NTLM credentials from the OPA server's local user account....

Critical Chrome Flaw Lets Malicious Apps Control Your PC

Researchers discovered critical vulnerabilities in Chromium that enabled malicious Chrome extensions to bypass the browser's sandbox and execute arbitrary code on the host system,...

Popular

Subscribe

spot_imgspot_img