Aman Mishra

Aman Mishra

Chinese UNC5174 Group Expands Arsenal with New Open Source Tool and C2 InfrastructureChinese UNC5174 Group Expands Arsenal with New Open Source Tool and C2 Infrastructure

Chinese UNC5174 Group Expands Arsenal with New Open Source Tool and C2 Infrastructure

The Sysdig Threat Research Team (TRT) has revealed a significant evolution in the offensive capabilities of the Chinese state-sponsored threat…

6 days ago
Threat Actors Manipulate Search Results to Lure Users to Malicious WebsitesThreat Actors Manipulate Search Results to Lure Users to Malicious Websites

Threat Actors Manipulate Search Results to Lure Users to Malicious Websites

Cybercriminals are increasingly exploiting search engine optimization (SEO) techniques and paid advertisements to manipulate search engine results, pushing malicious websites…

1 week ago
Hackers Imitate Google Chrome Install Page on Google Play to Distribute Android MalwareHackers Imitate Google Chrome Install Page on Google Play to Distribute Android Malware

Hackers Imitate Google Chrome Install Page on Google Play to Distribute Android Malware

Cybersecurity experts have unearthed an intricate cyber campaign that leverages deceptive websites posing as the Google Play Store to distribute…

1 week ago
Dangling DNS Attack Allows Hackers to Take Over Organization’s SubdomainDangling DNS Attack Allows Hackers to Take Over Organization’s Subdomain

Dangling DNS Attack Allows Hackers to Take Over Organization’s Subdomain

Hackers are exploiting what's known as "Dangling DNS" records to take over corporate subdomains, posing significant threats to organizations' security…

1 week ago
HelloKitty Ransomware Returns, Launching Attacks on Windows, Linux, and ESXi EnvironmentsHelloKitty Ransomware Returns, Launching Attacks on Windows, Linux, and ESXi Environments

HelloKitty Ransomware Returns, Launching Attacks on Windows, Linux, and ESXi Environments

Security researchers and cybersecurity experts have recently uncovered new variants of the notorious HelloKitty ransomware, signaling its resurgence with attacks…

1 week ago
RansomHub Ransomware Group Hits 84 Organizations as New Threat Actors EmergeRansomHub Ransomware Group Hits 84 Organizations as New Threat Actors Emerge

RansomHub Ransomware Group Hits 84 Organizations as New Threat Actors Emerge

The RansomHub ransomware group has emerged as a significant danger, targeting a wide array of industries across the globe. In…

1 week ago
Threat Actors Leverage Email Bombing to Evade Security Tools and Conceal Malicious ActivityThreat Actors Leverage Email Bombing to Evade Security Tools and Conceal Malicious Activity

Threat Actors Leverage Email Bombing to Evade Security Tools and Conceal Malicious Activity

Threat actors are increasingly using email bombing to bypass security protocols and facilitate further malicious endeavors. Email bombing, known also…

2 weeks ago
Threat Actors Launch Active Attacks on Semiconductor Firms Using Zero-Day ExploitsThreat Actors Launch Active Attacks on Semiconductor Firms Using Zero-Day Exploits

Threat Actors Launch Active Attacks on Semiconductor Firms Using Zero-Day Exploits

Semiconductor companies, pivotal in the tech industry for their role in producing components integral to everything from consumer electronics to…

2 weeks ago
Hackers Exploit Router Flaws in Ongoing Attacks on Enterprise NetworksHackers Exploit Router Flaws in Ongoing Attacks on Enterprise Networks

Hackers Exploit Router Flaws in Ongoing Attacks on Enterprise Networks

Enterprises are facing heightened cyber threats as attackers increasingly target network infrastructure, particularly routers, following a trend noted in Forescout…

2 weeks ago
Threat Actors Exploit Legitimate Crypto Packages to Deliver Malicious CodeThreat Actors Exploit Legitimate Crypto Packages to Deliver Malicious Code

Threat Actors Exploit Legitimate Crypto Packages to Deliver Malicious Code

Threat actors are using open-source software (OSS) repositories to install malicious code into trusted applications, particularly targeting cryptocurrency software. The…

2 weeks ago