Remove tag weapons
article thumbnail

Multiple APT groups exploited WinRAR flaw CVE-2023-38831

Security Affairs

Google TAG reported that both Russia and China-linked threat actors are weaponizing the a high-severity vulnerability in WinRAR. Google’s Threat Analysis Group (TAG) reported that in recent weeks multiple nation-state actors were spotted exploiting the vulnerability CVE-2023-38831 in WinRAR. ” reported Google TAG.

article thumbnail

APT37 used Internet Explorer Zero-Day in a recent campaign

Security Affairs

The attackers attempted to capitalize on the recent Itaewon Halloween crowd crush to trick users into opening the weaponized document and infecting their systems. ” reads the post published by TAG. .” ” reads the post published by TAG. Google TAG shared indicators of compromise (IOCs) for this campaign.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Russian Hackers Spotted Targeting U.S. Military Weapons and Hardware Supplier

The Hacker News

based military weapons and hardware supplier. Recorded Future attributed the new infrastructure to a threat activity group it tracks under the name TAG-53, and is broadly known by the cybersecurity community as Blue Callisto,

Hacking 94
article thumbnail

CVE-2024-21378 — Remote Code Execution in Microsoft Outlook 

NetSpi Technical

This blog will cover how we discovered CVE-2024-21378 and weaponized it by modifying Ruler , an Outlook penetration testing tool published by SensePost. This property tag contained the COM GUID that we have assigned in the configuration file, which ultimately defines what COM CLSID the form was eventually registered as.

article thumbnail

CVE-2024-21378 — Remote Code Execution in Microsoft Outlook 

NetSpi Technical

This blog will cover how we discovered CVE-2024-21378 and weaponized it by modifying Ruler , an Outlook penetration testing tool published by SensePost. This property tag contained the COM GUID that we have assigned in the configuration file, which ultimately defines what COM CLSID the form was eventually registered as.

article thumbnail

News on WhatsApp listening to sleeping users and Doctors fraternity raising voice against AI threat to humanity

CyberSecurity Insiders

said Musk, by directly tagging the same to Facebook chief Mark Zuckerberg. Their concern is regarding the development of AI robots to be used in the medical field and the use of AI-propelled Lethal Autonomous Weapon Systems (LAWS) that could indulge in mass murders of innocent populace.

article thumbnail

North Korea steals $620m Ethereum from US Video Game maker

CyberSecurity Insiders

US Treasury has endorsed the news and tagged it as one of the biggest cryptocurrency heists of all time. And hackers funded by Kim were seen involving such cyber crimes to produce weapons meant for mass destructions. Highly placed sources say that the steal of funds was made to find the nuclear ambitions of Kim Jong UN.