Blog
-
Stealthy Credit Card Skimmer Targets WordPress Checkout Pages via Database Injection
A sophisticated credit card skimmer malware has been discovered targeting WordPress websites. The malware injects malicious JavaScript into database entries,…
-
Malware Analysis: A Kernel Land Rootkit Loader for FK_Undead
This analysis delves into a Windows rootkit loader for the FK_Undead malware family, known for intercepting user network traffic through…
-
SmokeLoader picks up ancient MS Office bugs to pack fresh credential stealer
Threat actors are exploiting old Microsoft Office vulnerabilities using SmokeLoader, a modular malware loader, to steal browser credentials. The campaign…
-
SECURITY AFFAIRS MALWARE NEWSLETTER – ROUND 27
Security Affairs Malware newsletter includes a collection of the best articles and research on malware in the international landscape.————————————————————————————————————————————–[7-Zip Zero-Day…
-
Security Affairs newsletter Round 505 by Pierluigi Paganini – INTERNATIONAL EDITION
A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from Security Affairs are free…
-
Many researchers are pseudonymous. That doesn’t justify ignoring their alerts.
For many years, the FTC has published guidance for businesses to Start with Security. Their advice has always included having…
-
2025-01-04: Four days of scans and probes and web traffic hitting my web server
2025-01-04 (SATURDAY): FOUR DAYS OF SCANS AND PROBES AND WEB TRAFFIC HITTING MY WEB SERVER——————————————————————————————NOTES:* Zip files are password-protected. Of…
-
Malicious npm packages target Ethereum developers
Malicious npm packages target Ethereum developers, impersonating Hardhat plugins to steal private keys and sensitive data.————————————————————————————————————————–[Hardhat](https://hardhat.org/), by the [Nomic Foundation](https://nomic.foundation/),…
-
US Treasury Department sanctioned Chinese cybersecurity firm linked to Flax Typhoon APT
The U.S. Treasury Department sanctioned Chinese cybersecurity firm Integrity Tech for its involvement in attacks attributed to the Flax Typhoon…
-
Nuclei flaw lets malicious templates bypass signature verification
![Nuclei](https://www.bleepstatic.com/content/hl-images/2025/01/04/nuclei-header.jpg)A now-fixed vulnerability in the open-source vulnerability scanner Nuclei could potentially allow attackers to bypass signature verification while sneaking malicious…