Yearly Archives: 2022
Hackers Use Cloud Services to Distribute Nanocore, Netwire, and AsyncRAT Malware
IEMLabs -
Threat actors are using Amazon and Microsoft's public cloud services into their harmful campaigns to deliver commodity remote access trojans (RATs) like Nanocore, Netwire,...
SMEs Still An Easy Target For Cybercriminals
IEMLabs -
According to a Markel Direct poll, cybercrime continues to be a big worry, with 51 percent of SMEs experiencing a cybersecurity incident.
Markel Direct surveyed...
NoReboot – Faking iPhone Shutdown and Reboot
IEMLabs -
A novel proof-of-concept vulnerability has been disclosed that imitates an iPhone reboot or shutdown to avoid virus removal. It's called NoReboot, and it also...
FBI Warns about Google Voice Authentication Scams
IEMLabs -
The FBI is warning consumers who post their phone numbers publicly about a new Google Voice authentication scam.
The Overview
Americans who reveal their phone number...
A New Approach to Detect Stealthy Malware on IoT Devices
IEMLabs -
Security researchers have developed a new method for detecting evasive malware on IoT devices that employs electromagnetic field emanations. Even in obfuscation situations, the...
New SysJoker backdoor targets Windows, macOS, and Linux
IEMLabs -
SysJoker, a new multi-platform backdoor malware that targets Windows, Linux, and macOS and can elude detection on all three operating systems, has been discovered...
KILLSHOT:– A Penetration Testing Framework, Information gathering tool & Website #vulnerability
IEMLabs -
With this tool user can spider their website and get important information and gather information automatically using whatweb-host-traceroute-dig-fierce-wafw00f or identify the CMS and find...
Windows Exploit Suggester:– Next Generation (WES-NG)
IEMLabs -
WES-NG is a tool based on the output of Windows' systeminfo utility, which lists the vulnerabilities to which the OS is vulnerable, as well...
Researchers Find Bugs in Over A Dozen Widely Used URL Parser Libraries
IEMLabs -
Inconsistencies and ambiguities have been discovered in 16 distinct Uniform Resource Locator (URL) parsing libraries, which might be exploited to evade validations and open...