Search results for:
RIG Exploit Kit
Cyber Security News
‘SessionShark’ – A New Toolkit Bypasses Microsoft Office 365 MFA Security
Security researchers have uncovered a new and sophisticated threat to Microsoft Office 365 users: a phishing-as-a-service toolkit dubbed “SessionShark O365 2FA/MFA.”
Promoted through cybercriminal marketplaces,...
cyber security
CrazyHunter Hacker Group Exploits Open-Source GitHub Tools to Target Organizations
A relatively new ransomware outfit known as CrazyHunter has emerged as a significant threat, particularly targeting Taiwanese organizations.
The group, which started its operations...
Cyber Security News
Cable: Powerful Post-Exploitation Toolkit for Active Directory Attacks
Cybersecurity researchers are raising alarms about Cable, a potent open-source post-exploitation toolkit designed to exploit Active Directory (AD) vulnerabilities.
With 298 GitHub stars and 33 forks...
CVE/vulnerability
PoC Exploit Reveals SSH Key Exposure via Yelp Vulnerability on Ubuntu
Security researchers have uncovered a critical vulnerability (CVE-2025-3155) in Ubuntu's default help browser Yelp that could expose sensitive system files including SSH private keys.
The...
Cloud
Hackers Exploit ‘Any/Any’ Communication Configurations in Cloud Services to Host Malware
Recent research by Veriti has uncovered a disturbing trend in cybersecurity: malicious actors are increasingly leveraging cloud infrastructure to distribute malware and operate command-and-control...
Cyber Attack
Hackers Exploiting Business Relationships to Attack Arab Emirates Aviation Sector
A sophisticated cyber espionage campaign targeting the aviation and satellite communications sectors in the United Arab Emirates has been uncovered by Proofpoint researchers.
The...
Apple
Trigon: Latest iOS Kernel Exploit Uncovered
A sophisticated kernel exploit leveraging CVE-2023-32434, an integer overflow vulnerability in Apple’s XNU virtual memory subsystem, has been unveiled by security researchers.
Dubbed Trigon, this exploit...
Cyber Security News
Black-Hat SEO Poisioning Attacks Exploit Indian Government and Financial Websites
A sophisticated black-hat SEO poisoning campaign has compromised over 150 Indian government websites and financial institutions, redirecting millions of users to fraudulent gambling platforms...