Blog


  • PlugX worm disinfection campaign feedbacks

    Reset [Blogpost](https://blog.sekoia.io/category/blogpost/ ‘Blogpost’) [Research -& Threat Intelligence](https://blog.sekoia.io/category/research-threat-intelligence/ ‘Research & Threat Intelligence’) PlugX worm disinfection campaign feedbacks==========================================[Botnet](https://blog.sekoia.io/tag/botnet/) [disinfection](https://blog.sekoia.io/tag/disinfection/) [feedback](https://blog.sekoia.io/tag/feedback/) [plugx](https://blog.sekoia.io/tag/plugx/) ![](https://t7f4e9n3.delivery.rocketcdn.me/wp-content/uploads/2024/04/TDR-badge.png)…


  • Recent Cases of Watering Hole Attacks, Part 2

    Continuing from the previous article, Part 2 covers another case of a watering hole attack. This time, we will look…


  • Dell SupportAssist Vulnerability Let Attackers Escalate Privileges

    A newly disclosed high-impact vulnerability in Dell’s widely used SupportAssist software could allow attackers to [escalate privileges](https://cybersecuritynews.com/dhcp-exploit-privilege-escalation-windows/)on affected systems.Identified as…


  • IBM AIX Vulnerability Let Attackers Trigger DoS Condition

    IBM has reported vulnerabilities in its AIX operating system that could allow attackers to cause a Denial of Service ([DoS](https://cybersecuritynews.com/ios-messenger-dos-vulnerability-emoji/))…


  • Researchers Uncovered Dark Web Operation Acquiring KYC Details

    iProov, a leading provider of biometric identity verification solutions, has uncovered a covert[dark web](https://cybersecuritynews.com/what-is-dark-web-monitoring/)operation aimed at undermining Know Your Customer…


  • Japan Airlines System Hit by Cyber Attack, Flight Operations Affected

    Japan Airlines (JAL), the nation’s second-largest airline, reported a significant cyberattack on its systems early Thursday morning, causing disruptions to…


  • DDoS Attacks Surge as Africa Expands Its Digital Footprint

    * [Сloud Security](/cloud-security)* [Threat Intelligence](/threat-intelligence)* [Cyberattacks -& Data Breaches](/cyberattacks-data-breaches)* [Cyber Risk](/cyber-risk)[![Dark Reading Global Logo](https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/bltc8a6395802cafad0/654e0d60123f32040a075bab/Dark_Reading_Logo_Global_k.png?width=700&auto=webp&quality=80&disable=upscale ‘Dark Reading Global Logo’)Breaking cybersecurity news,…


  • Analyzing Malicious Intent in Python Code: A Case Study

    Two malicious packages, Zebo-0.1.0 and Cometlogger-0.1, were identified by an AI-driven OSS malware detection system. These packages contain Python scripts…


  • More SSH Fun!

    A Windows batch file has been discovered that abuses the ssh.exe tool in modern Windows versions to create a backdoor.…


  • SECURITY AFFAIRS MALWARE NEWSLETTER – ROUND 25

    Security Affairs Malware newsletter includes a collection of the best articles and research on malware in the international landscape.————————————————————————————————————————————–[Vishing via…