Aman Mishra

Aman Mishra

New Steganography Campaign Exploits MS Office Vulnerability to Distribute AsyncRATNew Steganography Campaign Exploits MS Office Vulnerability to Distribute AsyncRAT

New Steganography Campaign Exploits MS Office Vulnerability to Distribute AsyncRAT

A recently uncovered cyberattack campaign has brought steganography back into the spotlight, showcasing the creative and insidious methods attackers employ…

1 week ago
Hackers Exploit Ivanti Connect Secure 0-Day to Deploy DslogdRAT and Web ShellHackers Exploit Ivanti Connect Secure 0-Day to Deploy DslogdRAT and Web Shell

Hackers Exploit Ivanti Connect Secure 0-Day to Deploy DslogdRAT and Web Shell

Threat actors exploited a zero-day vulnerability in Ivanti Connect Secure, identified as CVE-2025-0282, to deploy malicious tools including a web…

1 week ago
Weaponized SVG Files Used by Threat Actors to Redirect Users to Malicious SitesWeaponized SVG Files Used by Threat Actors to Redirect Users to Malicious Sites

Weaponized SVG Files Used by Threat Actors to Redirect Users to Malicious Sites

Cybercriminals are increasingly weaponizing Scalable Vector Graphics (SVG) files to orchestrate sophisticated phishing campaigns. According to research from Intezer, a…

1 week ago
Google Warns: Threat Actors Growing More Sophisticated, Exploiting Zero-Day VulnerabilitiesGoogle Warns: Threat Actors Growing More Sophisticated, Exploiting Zero-Day Vulnerabilities

Google Warns: Threat Actors Growing More Sophisticated, Exploiting Zero-Day Vulnerabilities

Google’s Mandiant team has released its M-Trends 2025 report, highlighting the increasing sophistication of threat actors, particularly China-nexus groups. These…

1 week ago
Critical Langflow Flaw Enables Malicious Code Injection – Technical Breakdown ReleasedCritical Langflow Flaw Enables Malicious Code Injection – Technical Breakdown Released

Critical Langflow Flaw Enables Malicious Code Injection – Technical Breakdown Released

A critical remote code execution (RCE) vulnerability, identified as CVE-2025-3248 with a CVSS score of 9.8, has been uncovered in…

1 week ago
Hackers Exploit NFC Technology to Steal Money from ATMs and POS TerminalsHackers Exploit NFC Technology to Steal Money from ATMs and POS Terminals

Hackers Exploit NFC Technology to Steal Money from ATMs and POS Terminals

In a disturbing trend, cybercriminals, predominantly from Chinese underground networks, are exploiting Near Field Communication (NFC) technology to perpetrate large-scale…

2 weeks ago
Threat Actors Leverage TAG-124 Infrastructure to Deliver Malicious PayloadsThreat Actors Leverage TAG-124 Infrastructure to Deliver Malicious Payloads

Threat Actors Leverage TAG-124 Infrastructure to Deliver Malicious Payloads

In a concerning trend for cybersecurity, multiple threat actors, including ransomware groups and state-sponsored entities, are utilizing a malicious traffic…

2 weeks ago
Ransomware Actors Ramp Up Attacks Organizations with Emerging Extortion TrendsRansomware Actors Ramp Up Attacks Organizations with Emerging Extortion Trends

Ransomware Actors Ramp Up Attacks Organizations with Emerging Extortion Trends

Unit 42’s 2025 Global Incident Response Report, ransomware actors are intensifying their cyberattacks, with 86% of incidents causing significant business…

2 weeks ago
New SMS Phishing Attack Weaponizes Google AMP Links to Evade DetectionNew SMS Phishing Attack Weaponizes Google AMP Links to Evade Detection

New SMS Phishing Attack Weaponizes Google AMP Links to Evade Detection

Group-IB’s High-Tech Crime Trends Report 2025 reveals a sharp 22% surge in phishing websites, with over 80,000 detected in 2024.…

2 weeks ago
Russian Hackers Exploit Microsoft OAuth 2.0 to Target OrganizationsRussian Hackers Exploit Microsoft OAuth 2.0 to Target Organizations

Russian Hackers Exploit Microsoft OAuth 2.0 to Target Organizations

Cybersecurity firm Volexity has tracked a series of highly targeted attacks by suspected Russian threat actors, identified as UTA0352 and…

2 weeks ago