Category: Threat Intel Reports
-
Stealthy Credit Card Skimmer Targets WordPress Checkout Pages via Database Injection
A sophisticated credit card skimmer malware has been discovered targeting WordPress websites. The malware injects malicious JavaScript into database entries,…
-
Malware Analysis: A Kernel Land Rootkit Loader for FK_Undead
This analysis delves into a Windows rootkit loader for the FK_Undead malware family, known for intercepting user network traffic through…
-
SmokeLoader picks up ancient MS Office bugs to pack fresh credential stealer
Threat actors are exploiting old Microsoft Office vulnerabilities using SmokeLoader, a modular malware loader, to steal browser credentials. The campaign…
-
Many researchers are pseudonymous. That doesn’t justify ignoring their alerts.
For many years, the FTC has published guidance for businesses to Start with Security. Their advice has always included having…
-
Security Affairs newsletter Round 505 by Pierluigi Paganini – INTERNATIONAL EDITION
A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from Security Affairs are free…
-
SECURITY AFFAIRS MALWARE NEWSLETTER – ROUND 27
Security Affairs Malware newsletter includes a collection of the best articles and research on malware in the international landscape.————————————————————————————————————————————–[7-Zip Zero-Day…
-
Google Chrome is making it easier to share specific parts of long PDFs
![Chrome](https://www.bleepstatic.com/content/hl-images/2023/06/16/Google-Chrome-headpic.jpg)Google is adding the Text Fragment feature to its PDF reader to make it easier to share specific parts of…
-
Nuclei flaw lets malicious templates bypass signature verification
![Nuclei](https://www.bleepstatic.com/content/hl-images/2025/01/04/nuclei-header.jpg)A now-fixed vulnerability in the open-source vulnerability scanner Nuclei could potentially allow attackers to bypass signature verification while sneaking malicious…
-
US Treasury Department sanctioned Chinese cybersecurity firm linked to Flax Typhoon APT
The U.S. Treasury Department sanctioned Chinese cybersecurity firm Integrity Tech for its involvement in attacks attributed to the Flax Typhoon…
-
Malicious npm packages target Ethereum developers
Malicious npm packages target Ethereum developers, impersonating Hardhat plugins to steal private keys and sensitive data.————————————————————————————————————————–[Hardhat](https://hardhat.org/), by the [Nomic Foundation](https://nomic.foundation/),…