Aman Mishra

Aman Mishra

Earth Alux Hackers Use VARGIET Malware to Target OrganizationsEarth Alux Hackers Use VARGIET Malware to Target Organizations

Earth Alux Hackers Use VARGIET Malware to Target Organizations

A new wave of cyberattacks orchestrated by the advanced persistent threat (APT) group Earth Alux has been uncovered, revealing the…

2 days ago
“Lazarus Hackers Group” No Longer Refer to a Single APT Group But a Collection of Many Sub-Groups“Lazarus Hackers Group” No Longer Refer to a Single APT Group But a Collection of Many Sub-Groups

“Lazarus Hackers Group” No Longer Refer to a Single APT Group But a Collection of Many Sub-Groups

The term "Lazarus Group," once used to describe a singular Advanced Persistent Threat (APT) actor, has evolved to represent a…

2 days ago
DarkCloud: An Advanced Stealer Malware Sold on Telegram to Target Windows DataDarkCloud: An Advanced Stealer Malware Sold on Telegram to Target Windows Data

DarkCloud: An Advanced Stealer Malware Sold on Telegram to Target Windows Data

DarkCloud, a highly advanced stealer malware, has emerged as a significant threat to Windows systems since its debut in 2022.…

2 days ago
Triton RAT Uses Telegram for Remote System Access and ControlTriton RAT Uses Telegram for Remote System Access and Control

Triton RAT Uses Telegram for Remote System Access and Control

Cado Security Labs has uncovered a new Python-based Remote Access Tool (RAT) named Triton RAT, which leverages Telegram for remote…

2 days ago
Russian Hackers Leverage Bulletproof Hosting to Shift Network InfrastructureRussian Hackers Leverage Bulletproof Hosting to Shift Network Infrastructure

Russian Hackers Leverage Bulletproof Hosting to Shift Network Infrastructure

Russian-aligned cyber threat groups, UAC-0050 and UAC-0006, have significantly escalated their operations in 2025, targeting entities worldwide with a focus…

2 days ago
Threat Actors Embed Malware in WordPress Sites to Enable Remote Code ExecutionThreat Actors Embed Malware in WordPress Sites to Enable Remote Code Execution

Threat Actors Embed Malware in WordPress Sites to Enable Remote Code Execution

Security researchers have uncovered a new wave of cyberattacks targeting WordPress websites through the exploitation of the "mu-plugins" (Must-Use plugins)…

2 days ago
Weaponized Zoom Installer Used by Hackers to Gain RDP Access and Deploy BlackSuit RansomwareWeaponized Zoom Installer Used by Hackers to Gain RDP Access and Deploy BlackSuit Ransomware

Weaponized Zoom Installer Used by Hackers to Gain RDP Access and Deploy BlackSuit Ransomware

Cybersecurity researchers have uncovered a sophisticated attack campaign where threat actors utilized a trojanized Zoom installer to infiltrate systems, gain…

2 days ago
Konni RAT Exploit Windows Explorer Limitations To Launches a Multi-Stage Attack & Steal DataKonni RAT Exploit Windows Explorer Limitations To Launches a Multi-Stage Attack & Steal Data

Konni RAT Exploit Windows Explorer Limitations To Launches a Multi-Stage Attack & Steal Data

Konni RAT, a highly advanced Remote Access Trojan (RAT), has emerged as a significant cybersecurity threat, leveraging Windows Explorer limitations…

2 days ago
New Android Malware “TsarBot” Targeting 750 Banking, Finance & Crypto AppsNew Android Malware “TsarBot” Targeting 750 Banking, Finance & Crypto Apps

New Android Malware “TsarBot” Targeting 750 Banking, Finance & Crypto Apps

A newly identified Android malware, dubbed TsarBot, has emerged as a potent cyber threat targeting over 750 applications across banking,…

2 days ago
Apache Tomcat Vulnerability Exploited to Execute Malicious Arbitrary Code on ServersApache Tomcat Vulnerability Exploited to Execute Malicious Arbitrary Code on Servers

Apache Tomcat Vulnerability Exploited to Execute Malicious Arbitrary Code on Servers

A critical remote code execution (RCE) vulnerability, tracked as CVE-2025-24813, is being actively exploited in Apache Tomcat servers. Critical RCE…

2 days ago