CVE-2022-30190 Actively Exploited in the Wild: MSDT Vulnerability Used For Spreading PowerShell Stealer
In this case, instead of Microsoft Word files, attackers used RTF files to download information stealer into the victim’s system.
In this case, instead of Microsoft Word files, attackers used RTF files to download information stealer into the victim’s system.
Cyble analyzes Hazard Token Grabber, an upgraded info stealer primarily targeting Discord users.
Hazard Token Grabber Read More »
Cyble discusses a Zero-Day Exploit of the MSDT Vulnerability CVE-2022-30190, how it can be exploited, and some workarounds to mitigate your exposure.
New Zero–day Exploit spotted in the wild Read More »
Cyble takes a look at some significant cyberattacks on Costa Rica and other nations and the impact on their respective governments.
Cyberattacks on Government Machinery Read More »
Cyble analyzes a new malware campaign distributing a sophisticated RAT to Android devices.
New malware Campaign delivers Android RAT Read More »
Read Cyble’s analysis of ERMAC 2.0, a resurfaced Android Banking Trojan that targets over 400 applications.
ERMAC Back In Action Read More »