INC RANSOM ransomware gang claims to have breached Xerox Corp

The INC RANSOM ransomware group claims to have hacked the American multinational corporation Xerox Corp. Xerox Corp provides document management solutions worldwide. The company’s Document Technology segment offers desktop monochrome and color printers, multifunction printers, copiers, digital printing presses, and light production devices; and production printing and publishing systems for the graphic communications marketplace and […]

Malware Leveraging Google Cookie Exploit via OAuth2 Functionality

By Deeba Ahmed
Among others, developers of the infamous Lumma, an infostealer malware, are already using the exploit by employing advanced…
This is a post from HackRead.com Read the original post: Malware Leveraging Google Cookie Exploit via OAut…

iPhone Spyware Exploits Obscure Chip Feature, Targets Researchers

By Deeba Ahmed
Triangulation of Terror: Inside the Most Sophisticated iPhone Spyware Campaign Ever Seen.
This is a post from HackRead.com Read the original post: iPhone Spyware Exploits Obscure Chip Feature, Targets Researchers

New Medusa Stealer Attacking Users to Steal Login Credentials

While the world celebrated Christmas, the cybercrime underworld feasted on a different kind of treat: the release of Meduza 2.2, a significantly upgraded password stealer poised to wreak havoc on unsuspecting victims.  Cybersecurity researchers at Resecurity uncovered the details of New Medusa Stealer malware. Resecurity is a cybersecurity company specializing in endpoint protection, risk management, […]

The post New Medusa Stealer Attacking Users to Steal Login Credentials appeared first on GBHackers on Security | #1 Globally Trusted Cyber Security News Platform.

New Version of Meduza Stealer Released in Dark Web

The Resecurity’s HUNTER unit spotted a new version of the Meduza stealer (version (2.2)) that was released in the dark web. On Christmas Eve, Resecurity’s HUNTER unit spotted the author of perspective password stealer Meduza has released a new version (2.2). One of the key significant improvements are support of more software clients (including browser-based […]

Operation Triangulation attacks relied on an undocumented hardware feature

Experts discovered that Operation Triangulation targeting Apple iOS devices leveraged an undocumented hardware feature. Researchers from the Russian cybersecurity firm Kaspersky discovered that threat actors behind the Operation Triangulation exploited an undocumented hardware feature to target Apple iOS devices. In early June, Kaspersky uncovered a previously unknown APT group that is targeting iOS devices with zero-click exploits as part […]

New Nim-Based Malware Delivered via Weaponized Word Document

Hackers use weaponized Word documents to deliver malicious payloads through social engineering.  By embedding malware or exploiting vulnerabilities in these documents, attackers trick users into opening them and leading to the execution of malicious code.  While leveraging the familiarity and trust associated with such file format, this tactic is effective for several illicit purposes:- Recently, […]

The post New Nim-Based Malware Delivered via Weaponized Word Document appeared first on GBHackers on Security | #1 Globally Trusted Cyber Security News Platform.