backdoor

  • Pavel Durov, founder and CEO of the instant messaging platform Telegram, has revealed that the French government has The post Telegram Refuses France’s Demand for Backdoor Access to User Data appeared first on Daily CyberSecurity.

    Read More

  • arXiv:2504.15674v1 Announce Type: new Abstract: Federated learning (FL) systems allow decentralized data-owning clients to jointly train a global model through uploading their locally trained updates to a centralized server. The property of decentralization enables adversaries to craft carefully designed backdoor updates to make the global model misclassify only when encountering adversary-chosen triggers. Existing defense mechanisms…

    Read More

  • A vulnerability was found in Host. It has been classified as very critical. Affected is an unknown function of the component Backdoor Service. The manipulation leads to improper privilege management. This vulnerability is traded as CVE-1999-0660. It is possible to launch the attack remotely. Furthermore, there is an exploit available. This vulnerability has a historic…

    Read More

  • Aikido Security disclosed a vulnerability in the XRP Ledger’s (XRPL) official JavaScript SDK, revealing that multiple compromised versions of the XRPL Node Package Manager (NPM) package were published to the registry starting April 21.  The affected versions, v4.2.1 through v4.2.4 and v2.14.2, contained a backdoor capable of exfiltrating private keys, posing a severe risk to…

    Read More

  • A new supply chain attack has been uncovered by Socket’s Threat Research Team, targeting developers who create Telegram The post Malicious npm Packages Backdoor Telegram Bot Developers appeared first on Daily CyberSecurity.

    Read More

  • Large language models (LLMs) have transformed the development of embodied intelligence. By providing a few contextual demonstrations (such as rationales and solution examples) developers can utilize the extensive internal knowledge of LLMs to effortlessly translate complex tasks described in abstract language into sequences of code snippets, which will serve as the execution logic for embodied…

    Read More

  • FortiGate Devices Compromised by Stealthy Backdoor Technique A backdoor discovered in Fortinet FortiGate devices has drawn attention due to its ability to persist even after patches are applied. The mechanism enables attackers to maintain read-only access to system files, potentially exposing sensitive configuration data. The situation has raised serious concerns within the cybersecurity community about…

    Read More

  • Organizations across Europe are having their Windows systems compromised with the BRICKSTORM backdoor linked to Chinese state-backed threat operation UNC5221 as part of a cyberespionage campaign that commenced three years ago, Infosecurity Magazine reports.

    Read More

  • Novel BPFDoor backdoor component facilitates covert attacks Attacks involving a novel controller linked to the BPFDoor malware have been launched by the Earth Bluecrow threat operation, also known as Red Menshen, DecisiveArchitect, and Red Dev 18, against the Linux systems of telecommunications, finance, and retail organizations in Hong Kong, South Korea, Malaysia, Mynanmar, and Egypt…

    Read More

  • Windows versions of the BrickStorm backdoor that the Chinese APT used in the MITRE hack last year have been active for years. The post MITRE Hackers’ Backdoor Has Targeted Windows for Years appeared first on SecurityWeek.

    Read More

  • CNBC reports that Apple’s appeal against the UK government’s order to create a “backdoor” allowing access to encrypted iPhone user data will be heard in public after the country’s Investigatory Powers Tribunal dismissed the government’s attempt to conduct the hearing behind closed doors due to national security risks.

    Read More

  • Apr 02, 2025Ravie LakshmananRansomware / Email Security The financially motivated threat actor known as FIN7 has been linked to a Python-based backdoor called Anubis (not to be confused with an Android banking trojan of the same name) that can grant them remote access to compromised Windows systems. “This malware allows attackers to execute remote shell…

    Read More

  • arXiv:2504.00170v1 Announce Type: new Abstract: It is common practice to outsource the training of machine learning models to cloud providers. Clients who do so gain from the cloud’s economies of scale, but implicitly assume trust: the server should not deviate from the client’s training procedure. A malicious server may, for instance, seek to insert backdoors…

    Read More

  • A vulnerability, which was classified as very critical, was found in Cisco Smart License Utility 2.0.0/2.1.0/2.2.0. Affected is an unknown function. The manipulation leads to backdoor. This vulnerability is traded as CVE-2024-20439. It is possible to launch the attack remotely. Furthermore, there is an exploit available. It is recommended to upgrade the affected component.

    Read More

  • CISA Publishes Anatomy of Advanced Ivanti VPN MalwareHackers using Trojans connected to a malware family deployed by Chinese nation-state hackers are actively exploiting a now-patched vulnerability in Ivanti Connect Secure appliances. The malware “contains capabilities of a rootkit, dropper, backdoor, bootkit, proxy and tunneler.”

    Read More

  • CISA Publishes Anatomy of Advanced Ivanti VPN MalwareHackers using Trojans connected to a malware family deployed by Chinese nation-state hackers are actively exploiting a now-patched vulnerability in Ivanti Connect Secure appliances. The malware “contains capabilities of a rootkit, dropper, backdoor, bootkit, proxy and tunneler.”

    Read More

  • Cisco Talos has uncovered an ongoing cyber campaign by the Gamaredon threat actor group, targeting Ukrainian users with malicious LNK files to deliver the Remcos backdoor. Active since at least November 2024, this campaign employs spear-phishing tactics, leveraging themes related to the Ukraine conflict to lure victims into executing the malicious files. The LNK files,…

    Read More

  • A sophisticated cyber espionage campaign targeting Ukrainian entities has been uncovered, revealing the latest tactics of the Russia-linked Gamaredon threat actor group. The attackers are leveraging weaponized LNK files disguised as Office documents to deliver the Remcos backdoor malware, utilizing themes related to troop movements in Ukraine as a social engineering lure to trick victims…

    Read More

  • In an era where deep learning models increasingly power critical systems from self-driving cars to medical devices, security researchers have unveiled DeBackdoor, an innovative framework designed to detect stealthy backdoor attacks before deployment. Backdoor attacks, among the most effective and covert threats to deep learning, involve injecting hidden triggers that cause models to behave maliciously…

    Read More

Post
Filter
Apply Filters