The digital landscape is a battlefield fraught with unseen dangers. Among the most insidious threats are keyloggers – malware programs designed to silently capture your keystrokes, stealing sensitive information like passwords, credit card details, and private messages. Recently, cybersecurity researchers at Splunk Threat Research Team have shed light on a particularly cunning adversary: Snake Keylogger. […]
Researchers from IBM and VU Amsterdam University have unveiled a novel CPU attack dubbed “GhostRace,” posing a significant threat to data security across various computing platforms. This article delves into the technical details of GhostRace, its potential impact, and mitigation strategies. GhostRace: Exploiting Speculative Execution Vulnerabilities GhostRace exploits Speculative Race Conditions (SRCs), a class of […]
The BianLian ransomware group, known for its focus on extortion, has been observed exploiting vulnerabilities in JetBrains TeamCity software to deploy malicious PowerShell backdoors. This finding highlights BianLian’s ability to adapt and adopt new techniques to infiltrate target networks. GuidePoint Security researchers discovered a recent BianLian attack that began with exploiting a vulnerability (CVE-2024-27198 or […]