Rapidly Information Technology News
Cisco Talos experts have uncovered that the red team framework MacroPack is being actively exploited by cybercriminals to disseminate malware such as Havoc, Brute Ratel, and the PhantomCore RAT trojan. During the analysis of...
Recently, security researcher Sergey Kornienko from PixiePoint published an analysis and demonstration of a critical zero-day vulnerability in the Windows kernel, identified as CVE-2024-38106. This privilege escalation vulnerability is already being actively exploited by...
D-Link has alerted its customers to the presence of four vulnerabilities, allowing for remote code execution (RCE), in the DIR-846W router model. These vulnerabilities affect all hardware versions and firmware, yet no patches will...
Since its emergence in February 2024, the ransomware group RansomHub has encrypted and stolen data from over 210 victims, according to U.S. authorities. Among the affected are organizations from diverse sectors, including water supply,...
Recently, a security researcher known by the pseudonym @hyprdude published an in-depth report on the vulnerability CVE-2024-20017, discovered in the network daemon wappd. This daemon is utilized in SDKs from MediaTek and SoftAP drivers...
In August of this year, researchers from Proofpoint uncovered an unusual campaign distributing malware, which the attackers have dubbed Voldemort. This malware is suspected of engaging in espionage, possessing capabilities for information gathering and...
Over the past year, 19 new top-level domains (TLDs) have been introduced, and a study conducted by Palo Alto Networks has revealed that these domains are being actively exploited for various cyberattacks. Among the...
Human Security has uncovered a significant scheme for monetizing pirated content through advertising networks. The perpetrators behind these sites place advertisements on pages hosting pirated content to generate revenue. Visitors to these sites become...
Researchers at Trend Micro have documented the exploitation of vulnerability CVE-2023-22527, which is being used to compromise Atlassian servers by installing the Godzilla backdoor. The flaw, rated CVSS 10.0, was discovered in Confluence Data...
Researchers have uncovered a CVE-2024-45678 vulnerability in the widely-used YubiKey 5 two-factor authentication devices, which could jeopardize the security of countless users who rely on these tokens to safeguard their accounts. The issue lies...
Experts at Palo Alto Networks have uncovered a network of fraudulent campaigns utilizing deepfakes of prominent figures to deceive users and steal funds. These campaigns are disseminated in various languages, including English, Spanish, French,...
ThreatFabric researchers have recently detected the activity of a new Android malware targeting banking users in Brazil. Security experts have identified this emerging threat as Rocinante, a sophisticated type of banking Trojan capable of...