Rapidly Information Technology News
Latin America is experiencing a sharp rise in phishing attacks linked to the distribution of dangerous banking trojans Mekotio and BBTok. These malicious programs are designed to steal banking credentials and execute unauthorized financial...
Following numerous sanctions and the exposure of the Predator spyware, its activity significantly declined. However, according to recent data from Insikt Group analysts, malicious campaigns involving spyware are once again gaining momentum. The Predator...
Trend Micro specialists have uncovered a new cross-platform backdoor named KTLVdoor, developed by the Chinese group Earth Lusca. KTLVdoor is written in Golang and has versions for both Windows and Linux. This previously unknown...
Chinese security researchers have recently uncovered real-world attacks exploiting the CVE-2024-30051 vulnerability (CVSS score: 7.8), which has been linked to cyberattacks involving QakBot, a notorious banking trojan. The vulnerability was first identified by Kaspersky...
Colombian President Gustavo Petro has requested that the Attorney General’s Office investigate the purchase of the Pegasus spyware for $11 million. According to Petro, Pegasus may have been used to monitor political opposition during...
Experts have published the exploit code and a detailed analysis of a zero-day vulnerability in Google Chrome. The Proof-of-Concept (PoC) exploit pertains to a type confusion bug identified as CVE-2024-5274 (CVSS score: 8.8) in...
The Indian cryptocurrency exchange WazirX has announced that 43% of client funds lost in the recent cyberattack are unlikely to be recovered. Company representatives disclosed that the exchange is undergoing a restructuring process, which...
In August, Iran fell victim to a large-scale cyberattack that threatened the stability of the country’s banking system. Sources familiar with the situation report that the government was forced into negotiations with the hackers,...
The JFrog team has uncovered a new method of supply chain attacks that was employed against PyPI packages. The technique, dubbed “Revival Hijack,” exploits the ability to re-register deleted packages. The attack occurs when...
A critical vulnerability has been discovered in the popular LiteSpeed Cache plugin for WordPress, potentially allowing attackers to hijack user accounts. The vulnerability, designated CVE-2024-44000 with a CVSS score of 7.5, affects versions up...
In 2024, the number of hacking attacks targeting cryptocurrency projects continues to surge, with the total amount of stolen funds exceeding $1.2 billion, marking a 15.5% increase compared to 2023. One of the most...
Cisco has temporarily closed its branded merchandise online store after the discovery of malicious code that was stealing users’ data during the checkout process. The store, which sells clothing and accessories featuring the company...