Caketap, a New Unix rootkit for stealing ATM banking data

Caketap, a New Unix rootkit for stealing ATM banking data

Caketap, a New Unix rootkit for stealing ATM banking data Post Views: 490 Reading Time: 2 Minutes Threat analysts following the activity of LightBasin, a financially motivated group of hackers, report the discovery of a previously unknown Unix rootkit that is used to...
Hundreds of GoDaddy-hosted sites backdoored in a single day

Hundreds of GoDaddy-hosted sites backdoored in a single day

Hundreds of GoDaddy-hosted sites backdoored in a single day Post Views: 445 Reading Time: 2 Minutes Internet security analysts have spotted a spike in backdoor infections on WordPress websites hosted on GoDaddy’s Managed WordPress service, all featuring an...
Most QNAP NAS Devices Affected by ‘Dirty Pipe’ Linux Flaw

Most QNAP NAS Devices Affected by ‘Dirty Pipe’ Linux Flaw

Most QNAP NAS Devices Affected by ‘Dirty Pipe’ Linux Flaw Post Views: 187 Reading Time: 2 Minutes The “Dirty Pipe” Linux kernel flaw – a high-severity vulnerability in all major distros that grants root access to unprivileged users who have local access – affects most...
News – new template post

News – new template post

News – new template post Post Views: 187 Premium Content Subscribe to Patreon to watch this episode. Reading Time: 3 Minutes Researchers have discovered a malicious campaign utilizing a never-before-seen technique for quietly planting fileless malware on target...
Ubisoft has confirmed it was hacked by Lapsus$ group

Ubisoft has confirmed it was hacked by Lapsus$ group

Ubisoft has confirmed it was hacked by Lapsus$ group Post Views: 411 Reading Time: 1 Minute Video games developer and distributor Ubisoft has confirmed that it was hacked earlier this month, with the Lapsus$ group believed to be responsible.     The...
Raccoon Stealer Crawls Into Telegram

Raccoon Stealer Crawls Into Telegram

Raccoon Stealer Crawls Into Telegram Post Views: 230 Reading Time: 2 Minutes A credential stealer, Raccoon Stealer,  the first to rose to popularity a couple of years ago is now abusing Telegram for command-and-control (C2).      A range of cybercriminals...