Malicious News
  • Home
  • About Us
  • Malware
  • Vulnerabilities
  • Facebook
  • Twitter

Malicious News

Malicious News
CISA Emergency Directive to Federal Agencies Regarding Ivanti Zero-Day Exploits

Vulnerabilities

CISA Emergency Directive to Federal Agencies Regarding Ivanti Zero-Day Exploits

In a recent development, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) issued an emergency directive on Friday, urging Federal Civilian Executive Branch (FCEB) agencies to implement mitigations against two actively exploited zero-day flaws found in Ivanti Connect Secure (ICS) and Ivanti Policy Secure (IPS) products. The vulnerabilities, namely

By Malicious News Jan 23, 2024
Admin Takeover Flaw In Synology DiskStation Manager

Vulnerabilities

Admin Takeover Flaw In Synology DiskStation Manager

A vulnerability has been identified in Synology's DiskStation Manager (DSM), capable of being exploited to uncover an administrator's password and seize control of the account remotely. According to Sharon Brizinov from Claroty's Team82 in a report on Tuesday, "Under some rare conditions, an attacker could leak enough information to restore

By Malicious News Oct 20, 2023
How to Boost Your Security with a Password Manager

General Security

How to Boost Your Security with a Password Manager

Introduction Are you tired of keeping track of all your passwords? Do you have trouble remembering which combination goes with what account? Enter the password manager. A password manager is a software program that securely stores and manages all your login information for various websites and applications. With just one

By Malicious News Jun 26, 2023
malware

malware

7 Places where malware can hide

Malware can hide in various places on a computer or network. Here are some common locations where malware may hide: 1. System files: Malware can disguise itself as legitimate system files or inject malicious code into existing files. 2. Temporary folders: Malware often uses temporary folders to hide and execute

By Malicious News Jun 3, 2023
Trojan Steals Facebook Credentials From Over 300K Android Users

malware

Trojan Steals Facebook Credentials From Over 300K Android Users

A new Android campaign called Schoolyard Bully has spread to over 300,000 Facebook users. The trojan has been found in applications downloaded from the Google Play store and third-party app stores. Schoolyard Bully disguises itself as an educational application primarily targeting Vietnamese readers. Zimperium Researchers said The trojan uses

By Malicious News Dec 3, 2022
vmware

Vulnerabilities

3 New Critical Warnings For VMware Workspace One Assist Software

VMware released security updates to fix 3 critical vulnerabilities in their One Assist Software. A malicious actor with network access may be able to obtain administrator access without the need to authenticate. Workspace One Assist is a real-time remote support software. These flaws are being tracked as CVE-2022-31685 (Authentication Bypass

By Malicious News Nov 9, 2022
OPENSSL

docker

Patches released for 2 OpenSSL High Vulnerabilities

On Nov 1st OpenSSL project has release patches for a couple of high severity flaws that could trigger Denial of Service or trigger remote code execution. Tracked as CVE-2022-3786 An attacker can craft a malicious email address in a certificate to overflow an arbitrary number of bytes containing the `.’ character

By Malicious News Nov 2, 2022
Apple releases IOS and iPadOS patches for an actively exploited zero-day vulnerability.

Vulnerabilities

Apple releases IOS and iPadOS patches for an actively exploited zero-day vulnerability.

On Monday Apple released a patch for a zero-day flaw that’s been actively exploited. Tracking as CVE-2022-42827 described An out-of-bounds write issue was addressed with improved bounds checking. In the out-of-bounds write vulnerability, the software writes data past the end, or before the beginning, of the intended buffer, which

By Malicious News Oct 26, 2022
Emotet

malware

Emotet What Does It Do?

Emotet was once described as the “world’s most dangerous malware“, by Europol. Security researchers first discovered the malware as a banking trojan in 2014. What is Emotet? Emotet is a Trojan that is spread through email, that could contain a malicious attachment or a malicious link. Emotet utilizes social

By Malicious News Oct 22, 2022
Zimbra

Zimbra

Zimbra Exploit Added to CISA KVE

CISA on Thursday, Oct 20 added the Zimbra Collaboration exploit to the Known Vulnerabilities Exploit catalog (KVE). The issue is tracked as CVE-2022-41352, this is a remote code execution vulnerability that has to do with cpio a third-party utility tool used to extract archive attachments from an email. Which allows

By Malicious News Oct 20, 2022
Malware threat

malware

5 Most Dangerous Malware Threats

Malware is constantly changing and becoming more advanced and harmful. Cybercriminals will do whatever it takes to access a computer system and handle sensitive data. 1. Clop Ransomware One of the deadliest computer risks is clop ransomware, which may start or stop processes in a Windows domain in order to

By Malicious News Oct 18, 2022
Fortinet Feature img

Authentication

Fortinet Authentication Bypass Exploit POC Released

Horizon3.ai recently released a proof of concept on the Fortinet Authentication Bypass vulnerability. Horizon3.ai researchers created an exploit after examining the differences between the vulnerable firmware and the patched version. Soon after releasing the proof of concept, exploit attempts numbers started to rise. On Thursday Wordfence Threat analyst

By Malicious News Oct 14, 2022
Fortinet

Authentication

Fortinet Critical Authentication Bypass Vulnerability has been exploited.

Fortinet on Monday published an advisory confirming that this vulnerability has been exploited in the wild. “Fortinet is aware of an instance where the vulnerability was exploited and recommended immediately validating your system against the following indicator of compromise in the device logs”. Earlier this month reports began circulating that

By Malicious News Oct 12, 2022
vm2

Vulnerabilities

Critical RCE Vulnerability Found in vm2 Sandbox Module

An extremely popular sandbox library with more than 16 million downloads a month, vm2 can run untrusted code securely in a single process with your code side by side. Researchers from Oxeye discovered the vulnerability codenamed “Sandbreak”, a critical remote code execution vulnerability. A threat actor who exploits the vulnerability

By Malicious News Oct 12, 2022
malware-img

malware

Malware what is it, and how to stay protected?

What is Malware? Malware (short for “malicious software”) is any program designed for malicious intent and used to exploit vulnerabilities, damage, or gain unauthorized access to a system or a computer network. Malware can delete your files, steal your personal information and lock you out of your system. Types of

By Malicious News Oct 11, 2022
cve-2022-36804

Vulnerabilities

Critical Atlassian Bitbucket Server Vulnerability being exploited

CISA on Sept 30th added a recently disclosed critical flaw impacting Atlassian’s Bitbucket Server and Data Center to the known exploited vulnerabilities (KEV) catalog. Bitbucket is a Git-based source code repository hosting service owned by Atlassian. Software professionals use this to build, test and deploy software. Tracked as CVE-2022-36804

By Malicious News Sep 30, 2022
Malicious News
  • Privacy Policy
Powered by Ghost