Latest news

Persistent backdoors via Linux pluggable authentication modules: a new threat
Spyware

Persistent backdoors via Linux pluggable authentication modules: a new threat

6 September 2024 dark6

Recent research by the Group-IB Digital Forensics and Incident Response (DFIR) team has revealed a novel technique exploiting Linux’s Pluggable...
Critical Progress LoadMaster vulnerability: unauthenticated code execution
Vulnerability

Critical Progress LoadMaster vulnerability: unauthenticated code execution

6 September 2024 dark6

A severe vulnerability (CVE-2024-7591) has been discovered in the Progress LoadMaster product line, including all releases and the Multi-Tenant (MT)...
Microchip Data Breach Confirmed by Company
Databreach

Microchip Data Breach Confirmed by Company

6 September 2024 dark6

Microchip Technology, a prominent American semiconductor manufacturer, has disclosed a cyberattack in August 2024 that compromised sensitive employee information. The...
Emansrepo: new cyber attacks
Malware

Emansrepo: new cyber attacks

5 September 2024 dark6

In August 2024, FortiGuard Labs unveiled a concerning new player in the cybersecurity landscape: Emansrepo, a Python-based infostealer. This malware...
Understanding the threat of RomCom’s ransomware campaign
Ransomware

Understanding the threat of RomCom’s ransomware campaign

5 September 2024 dark6

In recent months, the cyber threat landscape has seen a significant uptick in ransomware attacks, with the Russian group known...
Google Chrome update: enhancing security with version 128.0.6613
Vulnerability

Google Chrome update: enhancing security with version 128.0.6613

5 September 2024 dark6

In the ever-evolving landscape of cybersecurity, Google has rolled out significant updates for its Chrome Stable and Extended Stable channels,...
Addressing the critical CVE-2024-7261 vulnerability in Zyxel devices
Vulnerability

Addressing the critical CVE-2024-7261 vulnerability in Zyxel devices

5 September 2024 dark6

In a concerning development for network security, Zyxel has recently issued patches to address a critical operating system (OS) command...
Booking.com phishing attack: understanding the threat and protecting yourself
Phishing

Booking.com phishing attack: understanding the threat and protecting yourself

5 September 2024 dark6

In recent months, a highly sophisticated phishing attack targeting Booking.com has emerged, raising alarms among hotel managers and travelers alike....
YubiKey vulnerability: understanding the EUCLEAK threat
Vulnerability

YubiKey vulnerability: understanding the EUCLEAK threat

5 September 2024 dark6

In the ever-evolving landscape of cybersecurity, even the most trusted tools can fall prey to vulnerabilities. Recently, security researchers at...
Cybersecurity incident at Transport for London: a closer look
Cybercrime

Cybersecurity incident at Transport for London: a closer look

4 September 2024 dark6

On September 2, 2024, Transport for London (TfL) found itself facing a significant cyber attack that disrupted its operations and...
North Korean hackers exploit Chromium zero-day vulnerability
Vulnerability

North Korean hackers exploit Chromium zero-day vulnerability

4 September 2024 dark6

In the ever-evolving landscape of cybersecurity, the Chromium-based web browsers, such as Google Chrome and Microsoft Edge, have become prime...
The evolving threat of Latrodectus malware: a closer look at version 1.4
Malware

The evolving threat of Latrodectus malware: a closer look at version 1.4

4 September 2024 dark6

In the ever-changing landscape of cybersecurity, new threats emerge regularly, demanding constant vigilance and adaptation from professionals in the field....