Remove archive 10
article thumbnail

Top Trending CVEs of May 2023

NopSec

May was a rather quiet month for security research, but an excellent write up filtered to the masses from the Pwn2own 2023 conference held in Vancouver, B.C. Finally, it wouldn’t be a worthy blog post if we didn’t include a nugget from patch Tuesday. tar file manipulation. tar file manipulation. x) and VMware Fusion (13.x)

Risk 52
article thumbnail

Kali Linux 2023.4 Release (Cloud ARM64, Vagrant Hyper-V & Raspberry Pi 5)

Kali Linux

With 2023 coming to an end and before the holiday season starts, we thought today would be a good time to release Kali 2023.4. Additionally, David Bombal’s Raspberry Pi 5 Kali Linux install in 10 minutes came out to show off our initial work of Kali Linux on the Raspberry Pi 5. And is looking pretty in the process!

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Threat actors target law firms with GootLoader and SocGholish malware

Security Affairs

Researchers from eSentire have foiled 10 cyberattacks targeting six different law firms throughout January and February of 2023. This forum hosted a ZIP archive that contains the malicious.js Cyber criminals are targeting law firms with GootLoader and FakeUpdates (aka SocGholish) malware families. ” continues the analysis.

Malware 94
article thumbnail

The TOITOIN Trojan: Analyzing a New Multi-Stage Attack Targeting LATAM Region

Security Boulevard

This blog post provides an in-depth analysis of this emerging malware campaign and its corresponding infection chain. TOITOIN Infection Chain In May 2023, diligent threat hunters within the Zscaler cloud, recognized as the world's largest security cloud, made a significant breakthrough. Read on to learn more about this alarming threat.

Malware 104
article thumbnail

Spam and phishing in 2022

SecureList

blogging platform that posted a gallery of children’s drawings, encouraging users to vote for their favorites. Noon spyware (4.89%) moved up to second place, and Badun Trojans (4.61%) spreading as archived electronic documents moved down to third place. Scammers created a page on the telegra.ph

article thumbnail

A bowl full of security problems: Examining the vulnerabilities of smart pet feeders

SecureList

In this blog post, we’ll discuss the results of a vulnerability research study focused on a popular model of smart pet feeder. The package is a compressed archive protected by a password. However, as these devices become more sophisticated, they also become more vulnerable to cyberattacks.

article thumbnail

Copy-paste heist or clipboard-injector attacks on cryptousers

SecureList

The installer is missing a digital signature and is just a RAR SFX (self-extracting executable) archive. A password-protected RAR archive (random password). The SFX starts the original torbrowser.exe as a disguise, while also running the RAR extraction tool on the embedded password-protected RAR archive.