New Linux kernel memory corruption bug causes full system compromise

Researchers dubbed it a “straightforward Linux kernel locking bug” that they exploited against Debian Buster’s 4.19.0.13-amd64 kernel. In 2017, MacAfee researchers disclosed a memory corruption bug inside the Linux kernel’s UDP…

Case Study: How Can Heimdal™’s Next-Gen Antivirus Help You Stay Safe?

Business IT Plus has recently published a very interesting case study in which they explore the importance of having a good antivirus solution installed. Business IT Plus has been working…

PurpleFox Adds New Backdoor That Uses WebSockets

Trend Micro – Trend Micro – PurpleFox Adds New Backdoor That Uses WebSockets Cyber Threats In September 2021, the Trend Micro Managed XDR (MDR) team looked into suspicious activity related…

Vulnerable Video DVR Devices Now Targeted by the FreakOut Botnet

FreakOut botnet (aka Necro, N3Cr0m0rPh) creators have updated the malware and added a PoC exploit for Visual Tools DVR, an electronic video recorder utilized in surveillance video systems, capable of supporting up…

Top 30 most exploited software vulnerabilities being used today

For all the zero-days, custom-crafted malware and other completely unknown security vulnerabilities, others have been around for years and are widely used across the board. To showcase this, the FBI…

Newly Discovered Malware Infects Linux Systems

FontOnLake is a previously unknown malware family that is targeting any systems running Linux. The malware has a limited incidence in the wild and has a sophisticated architecture that allows…

Beware- FontOnLake Rootkit Malware Attacking Linux Systems

According to ESET’s researchers, components of FontOnLake malware are divided into three groups: Trojamized app, Rootkit, and Backdoor.  Researchers at Slovak cybersecurity company ESET have identified a new malware family…

GhostEmperor Campaign Targets Asian Countries Abusing Microsoft Vulnerabilities

Cybersecurity researchers have recently disclosed details of the Chinese-based threat actor GhostEmperor who allegedly targeted several south-east Asian countries for more than a year. According to Kaspersky specialists Mark Lechtik,…

A New Flaw Was Discovered in the Microsoft Windows Platform Binary Table (WPBT)

The flaw discovered by the researchers at Eclypsium in the Microsoft Windows Platform Binary Table (WPBT) can be exploited in attacks meant to install rootkits on all Windows computers that…

DirtyMoe: Code Signing Certificate

Avast –  Avast –  Abstract The DirtyMoe malware uses a driver signed with a revoked certificate that can be seamlessly loaded into the Windows kernel. Therefore, one of the goals…