BlackByte ransomware group adds VMware ESXi exploit to its arsenal
The attackers used the bug to gain control over virtual machines and escalate privileges within compromised environments.
The attackers used the bug to gain control over virtual machines and escalate privileges within compromised environments.
The tool allowed criminals to gain access to personal bank accounts by tricking victims into disclosing OTP passcodes or other sensitive info.
The FudModule rootkit is designed to gain kernel access while evading detection.
Google addresses yet another Chrome zero-day, Russian hackers caught using commercial spyware to compromise victims, and more.
Volodymyr Kadariya is believed to be a key player in a major international hacking operation.
The vulnerability, tracked as CVE-2024-7262, has been exploited since at least February 2024.
The attacks have targeted at least four US-based victims and one non-US victim.
White hat hackers now face mandatory reporting requirements under Chinese law.
This is the first instance of Android malware using such an NFC relay technique in the wild.
The AppDomainManager Injection technique can be used across a wide range of .NET Framework apps.
Showing elements 1081 - 1090