featured Archives - Page 3 of 3 - Velox Systems

3 Ransomware Group Newcomers to Watch in 2024

Amidst the dynamic landscape of cybersecurity, Cyberint’s research team delves into the latest ransomware threats, spotlighting three emerging players from 2023. The enigmatic 3AM Ransomware, discovered in Rust, stands out with limited but impactful incidents, revealing an unpredictability in cybercriminal strategies. Rhysida Ransomware, masquerading as a cybersecurity team, gains notoriety through attacks on healthcare institutions […]

Unveiling SpectralBlur: A Fresh macOS Backdoor Challenge by North Korean Threat Actors

Amid the dynamic landscape of cybersecurity, the recent unveiling of SpectralBlur, a newly discovered Apple macOS backdoor linked to North Korean threat actors, adds a compelling chapter to the ongoing narrative. Drawing parallels with the sophisticated KANDYKORN remote access trojan, SpectralBlur showcases moderate capabilities, allowing for file manipulation, shell execution, and configuration updates based on […]

Evading Windows 10 and 11 Protections: Uncovering a Fresh DLL Search Order Hijacking Variant

A recently unveiled variant of the dynamic link library (DLL) search order hijacking technique is causing ripples, posing a substantial threat to systems running Microsoft Windows 10 and Windows 11. Security researchers, notably Security Joes, shed light on this innovative approach that capitalizes on executables within the trusted WinSxS folder, sidestepping security measures and enabling […]

Rugmi Malware Loader Unleashes Daily Surge, Detecting Hundreds

Diving into the complex and ever-shifting world of cybersecurity, a menacing new player has taken the stage, deploying an advanced malware loader to unleash a barrage of information stealers. Identified by ESET as Win/TrojanDownloader.Rugmi, this malicious loader operates through three distinct components, facilitating the download and execution of encrypted payloads. Recent telemetry data indicates a […]

PikaBot: Navigating the Shadows of a Malvertising Menace

Enter the complex world of cyber threats, where the PikaBot malware loader has taken center stage in a sophisticated malvertising campaign. The article below unravels the intricacies of PikaBot’s evolution, from its origins in malspam campaigns to its current role as a formidable backdoor and payload distributor. As we explore the exploits of threat actor […]

Caution: Authorities Share Fresh Insights into Zero-Click Outlook Remote Code Execution Exploits.

Dive into the depths of recent revelations surrounding two now-patched security vulnerabilities in Microsoft Windows that cast a shadow over the Outlook email service. Discovered by Akamai security researcher Ben Barnea, these flaws, CVE-2023-35384 and CVE-2023-36710, offer a gateway for threat actors to achieve remote code execution on Outlook without any user interaction. The first […]

Unmasking GambleForce: A New Player in the Cybersecurity Arena

Enter the ominous realm of cybersecurity, where the enigmatic GambleForce has surfaced, orchestrating a series of startling SQL injection attacks since September 2023. Unveiling their arsenal, a report from Group-IB reveals GambleForce’s adept use of SQL injections and CMS vulnerabilities, targeting industries across the Asia-Pacific region, with six successful breaches. Distinguished by their reliance on […]

Unmasking the Threat: Trojan-Proxy Malware Hits macOS Users via Cracked Software

In the intricate dance between cybersecurity and cyber threats, a concerning revelation has surfaced – unauthorized websites circulating trojanized versions of cracked software, infecting unsuspecting Apple macOS users with a formidable Trojan-Proxy malware. Kaspersky’s security luminary, Sergey Puzan, delves into the sinister potential of this malware, highlighting its dual purpose: financial exploitation and enabling criminal […]