Sly Uduosa

Sylvester Uduosa who goes by the nickname 'Sly' is a Legal Practitioner, Certified Ethical Hacker and Python Programmer.

Hackers Infiltrate Resumes Sent to Corporate Hiring Managers With the ‘More Eggs’ CVWARE.

A year after potential candidates looking for work on LinkedIn were tempted with weaponized job offers, a new series of phishing assaults carrying the more eggs malware has been detected attacking corporate hiring supervisors with false resumes as an infection vector thus making it dubbed ‘the CV-WARE’ by Sly Uduosa, Slytech’s research lead. “This year, […]

Hackers Infiltrate Resumes Sent to Corporate Hiring Managers With the ‘More Eggs’ CVWARE. Read More »

New SolarMarker Malware Variant Employing Updated Techniques to Avoid Detection

Researchers have revealed an improved version of the SolarMarker virus that includes new features aimed at improving its defensive evasion skills and remaining undetected. “The newest version indicated an advancement from dealing with Windows Portable Executables (EXE files) to working with Windows installation package files (MSI files,” according to a report issued this month by

New SolarMarker Malware Variant Employing Updated Techniques to Avoid Detection Read More »

Vulnerabilities in Lenovo’s UEFI Firmware Affect Millions of Laptops

Three high-impact UEFI security vulnerabilities have been discovered in multiple Lenovo consumer laptop models, allowing malicious actors to deploy and execute firmware implants on the afflicted devices. According to ESET researcher Martin Smolár, the CVE-2021-3970, CVE-2021-3971, and CVE-2021-3972 vulnerabilities “affect firmware drivers originally supposed to be utilised solely during the production process of Lenovo consumer

Vulnerabilities in Lenovo’s UEFI Firmware Affect Millions of Laptops Read More »

The Haskers gang freely distributes ZingoStealer malware to other cybercriminals.

Haskers Gang, a crimeware-related threat actor, has distributed ZingoStealer, an information-stealing malware, for free on the internet, allowing other criminal groups to use it for nefarious purposes. In a study posted with The Hacker News, Cisco Talos researchers Edmund Brumaghin and Vanja Svajcer noted, “It features the capacity to collect personal information from users and

The Haskers gang freely distributes ZingoStealer malware to other cybercriminals. Read More »

The Browser-in-the-Browser (BITB) Attack Enabling Easier Phishing Attack

New phishing technique called browser-in-the-browser (BitB) attack can be xploited to act like a browser window within the browser in order to spoof a legitimate domain, which makes it possible to stage convincing phishing attacks. The method makes use of the third-party single sign-on (SSO) options embedded on websites such as “Sign in with Google”

The Browser-in-the-Browser (BITB) Attack Enabling Easier Phishing Attack Read More »

Access:7 Supply Chain Vulnerability Impacting ATMs, Medical and IoT Devices

As many as seven vulnerabilities have been disclosed in PTC’s Axeda software which could be weaponized to access medical and IoT devices without authorization. Popular known as Access:7, with weaknesses of which 3 are rated Critical in severity with the potential of affecting over 150 device models spanning over 100 different manufacturers which makes it

Access:7 Supply Chain Vulnerability Impacting ATMs, Medical and IoT Devices Read More »

Xenomorph Android Banking Trojan Now Spreading on Google Play Store

A new Android trojan has been observed to be distributed via the official Google Play Store with the goal of targeting 56 European banks and carrying out harvesting sensitive information from compromised devices. The trojan has been nicknamed Xenomorph and its noticed to share overlaps with another banking trojan tracked under the moniker Alien while

Xenomorph Android Banking Trojan Now Spreading on Google Play Store Read More »

Taiwanese Financial Trading Sector Suffers Cyber Attack by Chinese Hackers

Hackers aligned with objectives of the Chinese government have been linked to an organized supply chain attack on Taiwan’s financial sector. These attacks first commenced at the end of November 2021, with the intrusions attributed to a threat actor tracked as APT10, also known as Stone Panda, the MenuPass group and Bronze Riverside, and known

Taiwanese Financial Trading Sector Suffers Cyber Attack by Chinese Hackers Read More »

Microsoft Takes Steps to Disable Macros in Office Apps by Default to Block Malware Attacks

Microsoft announces plans to disable Visual Basic for Applications (VBA) macros by default across its products, including Word,Excel, PowerPoint, Access and Visio for documents downloaded from the web in an attempt to eliminate an entire class of attack vector. “Bad actors send macros in Office files to end users who unknowingly enable them, malicious payloads

Microsoft Takes Steps to Disable Macros in Office Apps by Default to Block Malware Attacks Read More »