Remove tag weapons
article thumbnail

Multiple APT groups exploited WinRAR flaw CVE-2023-38831

Security Affairs

Google TAG reported that both Russia and China-linked threat actors are weaponizing the a high-severity vulnerability in WinRAR. Google’s Threat Analysis Group (TAG) reported that in recent weeks multiple nation-state actors were spotted exploiting the vulnerability CVE-2023-38831 in WinRAR. ” reported Google TAG.

Archiving 121
article thumbnail

APT37 used Internet Explorer Zero-Day in a recent campaign

Security Affairs

The attackers attempted to capitalize on the recent Itaewon Halloween crowd crush to trick users into opening the weaponized document and infecting their systems. ” reads the post published by TAG. .” ” reads the post published by TAG. Google TAG shared indicators of compromise (IOCs) for this campaign.

IT 98
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

RomCom RAT attackers target groups supporting NATO membership of Ukraine

Security Affairs

info The cloned websites were spotted hosting weaponized versions of popular software. “This file’s goal is to load the OLE streams into Microsoft Word, to render an iframe tag responsible for the execution of the next stage of malware.” Real Domain Fake Domain ukrainianworldcongress[.]org org ukrainianworldcongress[.]info

article thumbnail

GUEST ESSAY: The drivers behind persistent ransomware — and defense tactics to deploy

The Last Watchdog

Related: It’s all about ‘ attack surface management ‘ However, today’s perpetrator isn’t standing in front of you brandishing a weapon. The price tag of the ransom is just one of the many costs of these attacks, and remediation can often exceed this fee many times over. But the situation isn’t hopeless.

article thumbnail

[Full-Disclosure] HideezKey 2 FAIL: How a good idea turns into a SPF (Security Product Failure)

Security Affairs

RFID Feature: One clue still left (from a hardware security POV) was about the RFID tag. From the opening of the case, it was visibly obvious that the RFID feature advertised by Hideez was not related to the NRF52, but was rather just a standalone re-writable tag. At this point, I will let the good-old Arny express my feelings.

Security 100
article thumbnail

Catches of the Month: Phishing Scams for December 2022

IT Governance

There are already websites and apps that people can use to doctor videos, and many people remain unaware about the existence of the technology, which could make it a powerful weapon in fraudsters’ arsenal. Watch out for World Cup phishing emails.

Phishing 111
article thumbnail

Security Affairs newsletter Round 334

Security Affairs

Follow me on Twitter: @securityaffairs and Facebook. Pierluigi Paganini. SecurityAffairs – hacking, newsletter).