PDQ Deploy users warned of credential-theft risk – Go Health Pro

PDQ Deploy users warned of credential-theft risk – Go Health Pro

The CERT Coordination Center (CERT/CC) published a vulnerability note regarding the risk of admin credential theft for users of PDQ Deploy. PDQ Deploy is a service that enables system administrators to deploy software and updates to machines within their network. The CERT/CC notice, published Wednesday, describes how admin credentials used by PDQ Deploy to install … Read more

Russian Hackers Deploy HATVIBE and CHERRYSPY Malware Across Europe and Asia – Go Health Pro

Russian Hackers Deploy HATVIBE and CHERRYSPY Malware Across Europe and Asia – Go Health Pro

Nov 22, 2024Ravie LakshmananCyber Espionage / Malware Threat actors with ties to Russia have been linked to a cyber espionage campaign aimed at organizations in Central Asia, East Asia, and Europe. Recorded Future’s Insikt Group, which has assigned the activity cluster the name TAG-110, said it overlaps with a threat group tracked by the Computer … Read more

Gophish Framework Used in Phishing Campaigns to Deploy Remote Access Trojans – Go Health Pro

Gophish Framework Used in Phishing Campaigns to Deploy Remote Access Trojans – Go Health Pro

Russian-speaking users have become the target of a new phishing campaign that leverages an open-source phishing toolkit called Gophish to deliver DarkCrystal RAT (aka DCRat) and a previously undocumented remote access trojan dubbed PowerRAT. “The campaign involves modular infection chains that are either Maldoc or HTML-based infections and require the victim’s intervention to trigger the … Read more

North Korean Menace Actors Deploy COVERTCATCH Malware by way of LinkedIn Job Scams – Go Well being Professional

North Korean Menace Actors Deploy COVERTCATCH Malware by way of LinkedIn Job Scams – Go Well being Professional

Sep 07, 2024Ravie LakshmananCyber Safety / Malware Menace actors affiliated with North Korea have been noticed leveraging LinkedIn as a strategy to goal builders as a part of a faux job recruiting operation. These assaults make use of coding assessments as a typical preliminary an infection vector, Google-owned Mandiant stated in a brand new report … Read more

x