Aman Mishra

Aman Mishra

Google Threat Intelligence Releases Actionable Threat Hunting Technique for Malicious .desktop FilesGoogle Threat Intelligence Releases Actionable Threat Hunting Technique for Malicious .desktop Files

Google Threat Intelligence Releases Actionable Threat Hunting Technique for Malicious .desktop Files

Google Threat Intelligence has unveiled a series of sophisticated threat hunting techniques to detect malicious .desktop files, a novel attack…

1 week ago
Researchers Unveil New Mechanism to Track Compartmentalized Cyber ThreatsResearchers Unveil New Mechanism to Track Compartmentalized Cyber Threats

Researchers Unveil New Mechanism to Track Compartmentalized Cyber Threats

Cisco Talos, in collaboration with The Vertex Project, has introduced an innovative approach to tackle the rising complexity of compartmentalized…

1 week ago
New HTTPBot Botnet Rapidly Expands to Target Windows MachinesNew HTTPBot Botnet Rapidly Expands to Target Windows Machines

New HTTPBot Botnet Rapidly Expands to Target Windows Machines

The HTTPBot Botnet, a novel Trojan developed in the Go programming language, has seen a sharp rise in activity since…

1 week ago
Healthcare Cyberattacks in 2024 Expose 276 Million Patient Records CompromisedHealthcare Cyberattacks in 2024 Expose 276 Million Patient Records Compromised

Healthcare Cyberattacks in 2024 Expose 276 Million Patient Records Compromised

The healthcare sector faced an unprecedented wave of cyber threats, with a staggering 92% of organizations reporting at least one…

1 week ago
Threat Actors Exploit AI and LLM Tools for Offensive Cyber OperationsThreat Actors Exploit AI and LLM Tools for Offensive Cyber Operations

Threat Actors Exploit AI and LLM Tools for Offensive Cyber Operations

A recent report from the S2W Threat Intelligence Center, TALON, sheds light on the escalating misuse of generative AI and…

1 week ago
Nation-State Actors Target Healthcare Institutions to Sabotage IT and OT SystemsNation-State Actors Target Healthcare Institutions to Sabotage IT and OT Systems

Nation-State Actors Target Healthcare Institutions to Sabotage IT and OT Systems

The nation-state actors have increasingly set their sights on healthcare institutions worldwide, launching sophisticated cyberattacks aimed at disrupting both Information…

1 week ago
Weaponized PyPI Package Targets Developers to Steal Source CodeWeaponized PyPI Package Targets Developers to Steal Source Code

Weaponized PyPI Package Targets Developers to Steal Source Code

Security researchers at RL have discovered a malicious Python package called "solana-token" on PyPI that is intended to prey on…

1 week ago
Chinese Hackers Exploit SAP NetWeaver Zero-Day Vulnerability to Target Critical InfrastructureChinese Hackers Exploit SAP NetWeaver Zero-Day Vulnerability to Target Critical Infrastructure

Chinese Hackers Exploit SAP NetWeaver Zero-Day Vulnerability to Target Critical Infrastructure

EclecticIQ analysts have uncovered a sophisticated cyber-espionage campaign orchestrated by China-nexus nation-state Advanced Persistent Threats (APTs) targeting critical infrastructure worldwide.…

1 week ago
Researchers Unveil New Threat-Hunting Techniques to Detect Azure Managed Identity AbuseResearchers Unveil New Threat-Hunting Techniques to Detect Azure Managed Identity Abuse

Researchers Unveil New Threat-Hunting Techniques to Detect Azure Managed Identity Abuse

A group of cybersecurity specialists from Hunters, working under the prestigious Team Axon, have presented sophisticated threat-hunting techniques in a…

1 week ago
Earth Ammit Hackers Deploy New Tools to Target Military DronesEarth Ammit Hackers Deploy New Tools to Target Military Drones

Earth Ammit Hackers Deploy New Tools to Target Military Drones

The threat actor group known as Earth Ammit, believed to be associated with Chinese-speaking APTs, has emerged as a significant…

1 week ago