featured Archives - Page 4 of 5 - Velox Systems

Fresh variant of the ZLoader malware emerges, now equipped with compatibility for 64-bit Windows systems

Amidst the dynamic landscape of cybersecurity, a renewed threat looms as ZLoader malware resurfaces nearly two years after the dismantling of its infrastructure. Zscaler ThreatLabz’s recent analysis reveals a formidable new variant, developed since September 2023, featuring RSA encryption, an updated domain generation algorithm, and compatibility with 64-bit Windows. Originating from the Zeus banking trojan, […]

Navigating Urgency: Unveiling a Critical Jenkins Vulnerability and the Imperative Need for Swift Patching to Thwart RCE Attacks!

In the fast-paced landscape of open-source CI/CD automation, Jenkins, a stalwart in the field, has recently overcome a significant security challenge by addressing nine vulnerabilities, including the critical CVE-2024-23897. This particular flaw, identified as an arbitrary file read vulnerability within the CLI, could potentially lead to remote code execution, exposing Jenkins instances to malicious actors. […]

The Surge in Ransomware Attacks on Healthcare: A Call for Action

  Introduction and Impact on Patient Care: Last year marked a concerning escalation in ransomware attacks on the healthcare sector, with cybersecurity firm Emsisoft reporting 46 hospital systems falling victim in 2023—a stark increase from 25 in 2022. Beyond the compromised IT systems, these attacks had severe repercussions, disrupting patient care and straining healthcare resources. […]

NoaBot Unleashed: The Cutting-Edge Mirai-Based Botnet Exploiting SSH Servers for Cryptocurrency Mining

Introducing NoaBot, a formidable Mirai-based botnet that has been orchestrating a crypto mining campaign since the inception of 2023. Unveiled by Akamai security researcher Stiv Kupchik, this malicious entity showcases advanced features, including a wormable self-spreader and an SSH key backdoor, distinguishing it from its Mirai counterparts. The botnet, potentially linked to the Rust-based malware […]

3 Ransomware Group Newcomers to Watch in 2024

Amidst the dynamic landscape of cybersecurity, Cyberint’s research team delves into the latest ransomware threats, spotlighting three emerging players from 2023. The enigmatic 3AM Ransomware, discovered in Rust, stands out with limited but impactful incidents, revealing an unpredictability in cybercriminal strategies. Rhysida Ransomware, masquerading as a cybersecurity team, gains notoriety through attacks on healthcare institutions […]

Unveiling SpectralBlur: A Fresh macOS Backdoor Challenge by North Korean Threat Actors

Amid the dynamic landscape of cybersecurity, the recent unveiling of SpectralBlur, a newly discovered Apple macOS backdoor linked to North Korean threat actors, adds a compelling chapter to the ongoing narrative. Drawing parallels with the sophisticated KANDYKORN remote access trojan, SpectralBlur showcases moderate capabilities, allowing for file manipulation, shell execution, and configuration updates based on […]

Evading Windows 10 and 11 Protections: Uncovering a Fresh DLL Search Order Hijacking Variant

A recently unveiled variant of the dynamic link library (DLL) search order hijacking technique is causing ripples, posing a substantial threat to systems running Microsoft Windows 10 and Windows 11. Security researchers, notably Security Joes, shed light on this innovative approach that capitalizes on executables within the trusted WinSxS folder, sidestepping security measures and enabling […]

Rugmi Malware Loader Unleashes Daily Surge, Detecting Hundreds

Diving into the complex and ever-shifting world of cybersecurity, a menacing new player has taken the stage, deploying an advanced malware loader to unleash a barrage of information stealers. Identified by ESET as Win/TrojanDownloader.Rugmi, this malicious loader operates through three distinct components, facilitating the download and execution of encrypted payloads. Recent telemetry data indicates a […]

PikaBot: Navigating the Shadows of a Malvertising Menace

Enter the complex world of cyber threats, where the PikaBot malware loader has taken center stage in a sophisticated malvertising campaign. The article below unravels the intricacies of PikaBot’s evolution, from its origins in malspam campaigns to its current role as a formidable backdoor and payload distributor. As we explore the exploits of threat actor […]

Caution: Authorities Share Fresh Insights into Zero-Click Outlook Remote Code Execution Exploits.

Dive into the depths of recent revelations surrounding two now-patched security vulnerabilities in Microsoft Windows that cast a shadow over the Outlook email service. Discovered by Akamai security researcher Ben Barnea, these flaws, CVE-2023-35384 and CVE-2023-36710, offer a gateway for threat actors to achieve remote code execution on Outlook without any user interaction. The first […]