Aman Mishra

North Korea IT Workers Expand Their Employment Across Europe To Infiltrate the Company Networks

North Korean IT workers have intensified their global operations, expanding their employment footprint across Europe to infiltrate corporate networks and…

4 days ago

Hackers Hijack Telegram Accounts via Default Voicemail Passwords

The Israeli Internet Association has issued a public warning about a surge in cyberattacks targeting Telegram accounts in Israel. The…

4 days ago

Gootloader Malware Spreads via Google Ads with Weaponized Documents

The notorious Gootloader malware has resurfaced with a new campaign that combines old tactics with modern delivery methods. This latest…

4 days ago

New Outlaw Linux Malware Using SSH brute-forcing To Maintain Botnet Activities for long Time

A persistent Linux malware known as "Outlaw" has been identified leveraging unsophisticated yet effective techniques to maintain a long-running botnet.…

4 days ago

Sliver Framework Customized Enhances Evasion and Bypasses EDR Detection

The Sliver Command & Control (C2) framework, an open-source tool written in Go, has been a popular choice for offensive…

4 days ago

Ransomware Threatens 93% of Industries— Resilience Is Critical

Ransomware continues to be one of the most disruptive cyber threats, with recent data revealing that it affects 93% of…

4 days ago

New Surge of IRS-Themed Attacks Targets Taxpayers’ Mobile Devices

As the U.S. tax filing deadline approaches, cybercriminals are intensifying their efforts to exploit taxpayers through a new wave of…

4 days ago

KoiLoader Exploits PowerShell Scripts to Drop Malicious Payloads

Cybersecurity experts at eSentire's Threat Response Unit (TRU) uncovered a sophisticated malware campaign leveraging KoiLoader, a malicious loader designed to…

4 days ago

APT34 Deploys Custom Malware Targeting Finance and Telecom Sectors

APT34, also known as OilRig or Helix Kitten, has intensified its cyber-espionage campaigns, deploying custom malware to target entities within…

4 days ago

Plantronics Hub Flaw Allows Attackers to Gain Elevated Privileges

A critical vulnerability has been identified in the Plantronics Hub software, a client application commonly used to configure Plantronics audio…

4 days ago