Threat Actors Deploy WordPress Malware in ‘mu-plugins’ Directory

Sucuri has discovered multiple malware families deployed in the WordPress mu-plugins directory to evade routine security checks.

The post Threat Actors Deploy WordPress Malware in ‘mu-plugins’ Directory appeared first on SecurityWeek.

SecurityWeek – ​Read More

Qakbot Resurfaces in Fresh Wave of ClickFix Attacks

Attackers post links to fake websites on LinkedIn to ask people to complete malicious CAPTCHA challenges that install malware.

darkreading – ​Read More

Hackers Exploit WordPress mu-Plugins to Inject Spam and Hijack Site Images

Threat actors are using the “mu-plugins” directory in WordPress sites to conceal malicious code with the goal of maintaining persistent remote access and redirecting site visitors to bogus sites.
mu-plugins, short for must-use plugins, refers to plugins in a special directory (“wp-content/mu-plugins”) that are automatically executed by WordPress without the need to enable them explicitly via the

The Hacker News – ​Read More

Hacker Leaks Samsung Customer Data

Hacker leaks 270,000 customer tickets allegedly stolen from Samsung Germany using long-compromised credentials.

The post Hacker Leaks Samsung Customer Data appeared first on SecurityWeek.

SecurityWeek – ​Read More

5 Impactful AWS Vulnerabilities You’re Responsible For

If you’re using AWS, it’s easy to assume your cloud security is handled – but that’s a dangerous misconception. AWS secures its own infrastructure, but security within a cloud environment remains the customer’s responsibility.
Think of AWS security like protecting a building: AWS provides strong walls and a solid roof, but it’s up to the customer to handle the locks, install the alarm systems,

The Hacker News – ​Read More

Part of EU’s New €1.3 Billion Investment Going to Cybersecurity

The European Commission plans on investing €1.3 billion ($1.4 billion) in cybersecurity, artificial intelligence and digital skills. 

The post Part of EU’s New €1.3 Billion Investment Going to Cybersecurity appeared first on SecurityWeek.

SecurityWeek – ​Read More

⚡ Weekly Recap: Chrome 0-Day, IngressNightmare, Solar Bugs, DNS Tactics, and More

Every week, someone somewhere slips up—and threat actors slip in. A misconfigured setting, an overlooked vulnerability, or a too-convenient cloud tool becomes the perfect entry point. But what happens when the hunters become the hunted? Or when old malware resurfaces with new tricks?
Step behind the curtain with us this week as we explore breaches born from routine oversights—and the unexpected

The Hacker News – ​Read More

CISA Analyzes Malware Used in Ivanti Zero-Day Attacks

CISA has published its analysis of Resurge, a SpawnChimera malware variant used in attacks targeting a recent Ivanti Connect Secure zero-day.

The post CISA Analyzes Malware Used in Ivanti Zero-Day Attacks appeared first on SecurityWeek.

SecurityWeek – ​Read More

170,000 Impacted by Data Breach at Chord Specialty Dental Partners

An email security incident at Chord Specialty Dental Partners, a US dental service organization, has impacted more than 170,000 people. 

The post 170,000 Impacted by Data Breach at Chord Specialty Dental Partners appeared first on SecurityWeek.

SecurityWeek – ​Read More

‘Crocodilus’ Android Banking Trojan Allows Device Takeover, Data Theft

The newly identified Android banking trojan Crocodilus takes over devices, enabling overlay attacks, remote control, and keylogging.

The post ‘Crocodilus’ Android Banking Trojan Allows Device Takeover, Data Theft appeared first on SecurityWeek.

SecurityWeek – ​Read More