Aggregator
Google Chrome security advisory (AV25-353)
New KimJongRAT Stealer Uses Weaponized LNK File to Deploy PowerShell-Based Dropper
The two new variants of the KimJongRAT stealer have emerged, showcasing the persistent and evolving nature of this malicious tool first identified in 2013. Detailed research by Palo Alto Networks’ Unit 42 reveals that these variants, one employing a Portable Executable (PE) file and the other a PowerShell implementation, leverage a weaponized Windows shortcut (LNK) […]
The post New KimJongRAT Stealer Uses Weaponized LNK File to Deploy PowerShell-Based Dropper appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Kairos
You must login to view this content
CVE-2021-45444 | Apple macOS up to 12.3 zsh Remote Code Execution (HT213257 / Nessus ID 239959)
CVE-2021-45444 | zsh up to 5.8.0 PROMPT_SUBST Expansion privilege escalation (FEDORA-2022-adf0c6d196 / Nessus ID 239959)
CVE-2020-13692 | PostgreSQL up to 42.2.12 JDBC Driver xml external entity reference (Nessus ID 239971)
CVE-2023-6780 | GNU C Library __vsyslog_internal integer overflow (Bug 176932 / Nessus ID 239976)
CVE-2024-24258 | MuPDF 1.23.9 glutAddSubMenu menuEntry memory leak (FEDORA-2024-0356803680 / EUVD-2024-21682)
CVE-2024-27316 | Apache HTTP Server up to 2.4.58 nghttp2 resource consumption (FEDORA-2024-1f11550e31 / Nessus ID 239975)
CVE-2023-35391 | Microsoft ASP.NET Core/.NET/Visual Studio information disclosure (Nessus ID 239977)
CVE-2023-36796 | Microsoft .NET Framework up to 4.8 Remote Code Execution (Nessus ID 239977)
CVE-2023-6246 | GNU C Library __vsyslog_internal heap-based overflow (Bug 176931 / Nessus ID 239976)
CVE-2023-6779 | GNU C Library __vsyslog_internal heap-based overflow (Bug 176932 / EUVD-2023-58991)
CVE-2023-33126 | Microsoft .NET/Visual Studio Local Privilege Escalation (Nessus ID 239977)
CVE-2023-36792 | Microsoft .NET Framework up to 4.8 Remote Code Execution (Nessus ID 239977)
CVE-2023-36793 | Microsoft .NET Framework up to 4.8 Remote Code Execution (Nessus ID 239977)
New Chaos RAT Variants Targeting Windows and Linux Systems to Steal Sensitive Data
The Acronis Threat Research Unit has identified new variants of Chaos RAT, a remote administration tool (RAT) that has evolved from an open-source project first observed in 2022 into a formidable multi-platform malware. These latest iterations of Chaos RAT are now targeting both Windows and Linux systems, showcasing an alarming level of sophistication through phishing-driven […]
The post New Chaos RAT Variants Targeting Windows and Linux Systems to Steal Sensitive Data appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
FireScorpion вместо Tor, Paranoia вместо паники: Securonis 3.0 в деталях
New Sophisticated Multi-Stage Malware Campaign Uses VBS Files to Execute PowerShell Script
A recently uncovered malware campaign has revealed a highly sophisticated, multi-stage infection process utilizing heavily obfuscated Visual Basic Script (VBS) files to deploy remote access trojans (RATs) such as Remcos, LimeRAT, DCRat, and AsyncRAT. Discovered across a cluster of 16 open directories on various hosts, this campaign relies on a file named “sostener.vbs” (Spanish for […]
The post New Sophisticated Multi-Stage Malware Campaign Uses VBS Files to Execute PowerShell Script appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.