Skip to content
SonicWall NetExtender Trojan and ConnectWise Exploits Used in Remote Access Attacks

SonicWall NetExtender Trojan and ConnectWise Exploits Used in Remote Access Attacks

Unknown threat actors have been distributing a trojanized version of SonicWall’s SSL VPN NetExtender application to steal credentials from unsuspecting users who may have installed it. “NetExtender enables remote users to securely connect and run applications on the company network,” SonicWall researcher Sravan Ganachari said. “Users can upload and downloadRead More »SonicWall NetExtender Trojan and ConnectWise Exploits Used in Remote Access Attacks

North Korea-linked Supply Chain Attack Targets Developers with 35 Malicious npm Packages

North Korea-linked Supply Chain Attack Targets Developers with 35 Malicious npm Packages

Cybersecurity researchers have uncovered a fresh batch of malicious npm packages linked to the ongoing Contagious Interview operation originating from North Korea. According to Socket, the ongoing supply chain attack involves 35 malicious packages that were uploaded from 24 npm accounts. These packages have been collectively downloaded over 4,000 times.Read More »North Korea-linked Supply Chain Attack Targets Developers with 35 Malicious npm Packages

New U.S. Visa Rule Requires Applicants to Set Social Media Account Privacy to Public

New U.S. Visa Rule Requires Applicants to Set Social Media Account Privacy to Public

The United States Embassy in India has announced that applicants for F, M, and J nonimmigrant visas should make their social media accounts public. The new guideline seeks to help officials verify the identity and eligibility of applicants under U.S. law. The U.S. Embassy said every visa application review isRead More »New U.S. Visa Rule Requires Applicants to Set Social Media Account Privacy to Public

Researchers Find Way to Shut Down Cryptominer Campaigns Using Bad Shares and XMRogue

Researchers Find Way to Shut Down Cryptominer Campaigns Using Bad Shares and XMRogue

Cybersecurity researchers have detailed two novel methods that can be used to disrupt cryptocurrency mining botnets. The methods take advantage of the design of various common mining topologies in order to shut down the mining process, Akamai said in a new report published today. “We developed two techniques by leveragingRead More »Researchers Find Way to Shut Down Cryptominer Campaigns Using Bad Shares and XMRogue

Hackers Target Over 70 Microsoft Exchange Servers to Steal Credentials via Keyloggers

Hackers Target Over 70 Microsoft Exchange Servers to Steal Credentials via Keyloggers

Unidentified threat actors have been observed targeting publicly exposed Microsoft Exchange servers to inject malicious code into the login pages that harvest their credentials. Positive Technologies, in a new analysis published last week, said it identified two different kinds of keylogger code written in JavaScript on the Outlook login pageRead More »Hackers Target Over 70 Microsoft Exchange Servers to Steal Credentials via Keyloggers

Copyright © 2025 infosecintel.net