SecureBug allows you to evaluate your offensive and defensive skills, in addition, to let you exchange your ideas and methodologies with thousands of people in the security field.
Join Nordic's No.1 Crowdsourced Security Platform For Offensive & Defensive Security Strategies.
ESET Research threat hunters Miloš Čermák, Robert Lipovský and Štefan Svorenčík disclosed a serious vulnerability called Kr00k at RSA Conference 2020 in San Francisco. The vulnerability in Wi-Fi chips affects billions of devices worldwide and allows attackers to eavesdrop on Wi-Fi communications. The bug (CVE-2019-15126) stems from the use of an all-zero encryption key in chips…
Trend Micro’s Zero Day Initiative (ZDI) informed this week that a major security flaw affecting every single supported version of Microsoft Exchange Server leaves attackers the ability to divulge or falsify corporate email communications at will. Attackers are actively scanning the Internet for Microsoft Exchange Servers vulnerable to the CVE-2020-0688 remote code execution vulnerability patched by…
The pasteboard on iPhones and iPads are open to exploitation by “malicious” apps on those devices to “steal” any data copied to the clipboard. Any cut-and-paste data temporarily stored on an iPhone or iPad’s memory can be accessed by all apps installed on the specific device, even malicious ones. The copy and paste function opens…
ObliqueRAT, a new remote access Trojan (RAT), is delivered to targeted organizations in southeast Asia via malicious Microsoft Office documents (maldocs), Cisco Talos says. Cisco Talos researchers have discovered a new malicious RAT tracked as ObliqueRAT which seems to be developed to attack government organizations and diplomatic targets particularly organizations in southeast Asia. The ongoing…
[vc_row][vc_column][vc_column_text]Zebrocy is a Russian APT that shares similarities and overlaps with both the Sofacy and BlackEnergy APTs. Recently “Zebrocy spearphished a fairly long list of targets throughout the world with a new Nim downloader,” according to Kaspersky Lab researchers. This rule can detect Zebrocy based on its behavior and some IOC containing hash, IP and…
DoppelPaymer operators have launched “Dopple” website to leak the stolen information of victims who refuse to pay a ransom. The operators said they have created this website to threaten victims that if they refuse to pay their information such as their names and important corporate data will be leaked on the site. The operators claim…
Google issued a Chrome update to address three security holes. The Chrome 80 update (version 80.0.3987.122) included a patch for a zero-day vulnerability (CVE-2020-6418) that has been actively exploited in the wild. The CVE-2020-6418 vulnerability is a type of confusion issue and has a severity rating of high that affects the V8 open-source JavaScript engine…
Researchers from CyberArk have discovered an infostealing malware that is relatively new on cybercriminal forums that can extract sensitive data from about 60 applications on a targeted computer. The operators behind the “Raccoon” infostealer Trojan have added new capabilities to this malware-as-service offering after being observed in the wild for the first time almost a year ago.…
Researchers discovered eight malicious Android apps that were spreading a new data-stealing malware strain that also signs victims up for expensive premium services. The malware, dubbed Haken malware, was found mostly in camera utilities and children’s games in the Google Play marketplace. The eight apps in question, which had collectively been downloaded 50,000 times, have…
New Phishing campaigns are using a CIM Finance account to steal user credentials; in these attacks, targeted users receive a phishing email that tells them they need to update their office 365. The attackers use a fake Microsoft form hosted on google with an authentic SSL certificate to trick recipients into thinking they are connected…