Tag: Chain
-
UK Health Club Chain ‘Total Fitness’ Data Leak Exposes KYC and Card Data
A recent KYC (Know Your Customer) data exposure at Total Fitness, a members-only club in the UK, left personal details of its members …
-
SSLoad Malware Employs MSI Installer To Kick-Start Delivery Chain
Malware distributors use MSI installers as Windows OS already trusts them to run with administrative rights by bypassing security controls. …
-
Wineloader – Analysis of the Infection Chain
By ARC Labs contributor, Shannon Mong ARC Labs recently analyzed a sample of the Wineloader backdoor for infection chain analysis and …
-
Hackers Using Weaponized PDF Files To Kickstart Infection Chain
Threat actors use weaponized PDF files for initial infection. This is because they can be embedded with malicious code, PDF readers’ …
-
VexTrio a hub of Cyber attacks With Massive Criminal Affiliate Chain
VexTrio, a cybercrime syndicate with a history dating back to at least 2017, has been implicated in nefarious activities utilizing a …
-
Crypto heist against Orbit Chain prompts theft of $86M
BleepingComputer reports that Orbit Chain has been estimated to have lost nearly $86 million following a cryptocurrency heist targeted at …
-
Over $80m in Crypto Stolen in Cyber-Attack on Orbit Chain
The attackers stole 26,741.6 of Ether (ETH), which were transferred to five wallet addresses, and around 15,498,358 of DAI (a stablecoin on …
-
1,450+ pfSense Servers Vulnerable to Remote Code Execution Attacks via Exploit Chain
Researchers discovered two vulnerabilities in pfSense CE related to Cross-Site Scripting (XSS) and Command Injection that allow an attacker …
-
WordPress POP Chain Flaw Exposes Over 800M+ Websites to Attack
A critical remote code execution vulnerability has been patched as part of the WordPress 6.4.2 version. This vulnerability exists in the …
-
HTX, Heco Chain lose almost $115M from crypto heist
Nearly $115 million worth of cryptocurrency have been stolen so far from the HTX digital currency exchange, formerly Huobi, and the Heco …
-
Binance’s Smart Chain Exploited in New ‘EtherHiding’ Malware Campaign
Threat actors have been observed serving malicious code by utilizing Binance’s Smart Chain (BSC) contracts in what has been described as …
-
Spyware Vendor Targets Egyptian Orgs With Rare iOS Exploit Chain
An Israeli surveillanceware company used the three Apple zero-day vulnerabilities disclosed last week to develop an exploit chain for …
●●●