Blog
-
PlugX worm disinfection campaign feedbacks
Reset [Blogpost](https://blog.sekoia.io/category/blogpost/ ‘Blogpost’) [Research -& Threat Intelligence](https://blog.sekoia.io/category/research-threat-intelligence/ ‘Research & Threat Intelligence’) PlugX worm disinfection campaign feedbacks==========================================[Botnet](https://blog.sekoia.io/tag/botnet/) [disinfection](https://blog.sekoia.io/tag/disinfection/) [feedback](https://blog.sekoia.io/tag/feedback/) [plugx](https://blog.sekoia.io/tag/plugx/) ![](https://t7f4e9n3.delivery.rocketcdn.me/wp-content/uploads/2024/04/TDR-badge.png)…
-
Recent Cases of Watering Hole Attacks, Part 2
Continuing from the previous article, Part 2 covers another case of a watering hole attack. This time, we will look…
-
Dell SupportAssist Vulnerability Let Attackers Escalate Privileges
A newly disclosed high-impact vulnerability in Dell’s widely used SupportAssist software could allow attackers to [escalate privileges](https://cybersecuritynews.com/dhcp-exploit-privilege-escalation-windows/)on affected systems.Identified as…
-
IBM AIX Vulnerability Let Attackers Trigger DoS Condition
IBM has reported vulnerabilities in its AIX operating system that could allow attackers to cause a Denial of Service ([DoS](https://cybersecuritynews.com/ios-messenger-dos-vulnerability-emoji/))…
-
Researchers Uncovered Dark Web Operation Acquiring KYC Details
iProov, a leading provider of biometric identity verification solutions, has uncovered a covert[dark web](https://cybersecuritynews.com/what-is-dark-web-monitoring/)operation aimed at undermining Know Your Customer…
-
Japan Airlines System Hit by Cyber Attack, Flight Operations Affected
Japan Airlines (JAL), the nation’s second-largest airline, reported a significant cyberattack on its systems early Thursday morning, causing disruptions to…
-
DDoS Attacks Surge as Africa Expands Its Digital Footprint
* [Сloud Security](/cloud-security)* [Threat Intelligence](/threat-intelligence)* [Cyberattacks -& Data Breaches](/cyberattacks-data-breaches)* [Cyber Risk](/cyber-risk)[![Dark Reading Global Logo](https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/bltc8a6395802cafad0/654e0d60123f32040a075bab/Dark_Reading_Logo_Global_k.png?width=700&auto=webp&quality=80&disable=upscale ‘Dark Reading Global Logo’)Breaking cybersecurity news,…
-
Analyzing Malicious Intent in Python Code: A Case Study
Two malicious packages, Zebo-0.1.0 and Cometlogger-0.1, were identified by an AI-driven OSS malware detection system. These packages contain Python scripts…
-
More SSH Fun!
A Windows batch file has been discovered that abuses the ssh.exe tool in modern Windows versions to create a backdoor.…
-
SECURITY AFFAIRS MALWARE NEWSLETTER – ROUND 25
Security Affairs Malware newsletter includes a collection of the best articles and research on malware in the international landscape.————————————————————————————————————————————–[Vishing via…