Friday, January 22, 23:44
Labels malicious code

Tag: malicious code

Windows Update: Used to execute malicious code

The Windows Update client can be used by cyber criminals to execute malicious code on ...

Chrome extension steals private keys from crypto wallets

MyCrypto platform security manager Harry Denley has discovered a malicious extension of Google Chrome, which inserts JavaScript into sites to ...

The FBI warns businesses about e-skimming attacks

The FBI warns US private sector businesses about increasing e-skimming attacks. They are also often called Magecart attacks. E-skimming attacks ...

Volusion: Hackers steal card details from customers of thousands of sites

The software company Volusion, which offers cloud services to online stores, has suffered a hacking attack. Hackers distribute malicious code, which records ...

Adobe: ColdFusion platform release update to release critical vulnerabilities

Three vulnerabilities have recently been reported on Adobe's ColdFusion platform. The company immediately released an update to address the vulnerabilities. THE...

Malvertising campaign exploits known vulnerabilities of WordPress

Some Defiant researchers have discovered a new malvertising campaign that uses WordPress vulnerabilities to infect websites with malware. Hackers are taking advantage ...

Malicious code was removed from the PureScript npm installer

Another JavaScript package in PureScript's npm installer has been hacked, forcing administrators to revise their software to clean up the malware ...

A dangerous backdoor was found in the popular Ruby library strong_password

A dangerous backdoor has been identified in a popular Ruby library, strong_password, which checks how powerful passwords users choose. The malicious ...

Hackers hide malicious code in images and text

One of the methods used by hackers to spread malware is sealing. By "sealing" we mean the secret placement ...

New attack by hackers puts 4.600 websites at risk

A new hacker attack may have compromised thousands of websites. As it became known, some hackers attacked two services, which ...

Most Read

Intel CPUs Review: Core i7-10700 vs Core i7-10700K!

Over the years, the Intel series of processors (CPUs) introduced the series of overclocking models "K" and more recently the series ...

The DeLorean can return as an electric car

The DMC DeLorean has been out of production for almost 40 years, but it looks like the iconic vehicle will return as an electric car.

Windows RDP servers are used to support DDoS

Cybercrime gangs are abusing Windows Remote Desktop Protocol (RDP) systems to reinforce the unwanted ...

SEPA: He refused to pay a ransom and thousands of files were leaked

Thousands of stolen files of the Scottish Environmental Protection Agency (SEPA) have been published by hackers, after the organization refused to pay the ransom ...