Balaji

AGENT TESLA Malware Steals login Credentials From Chrome & Firefox

Researchers investigated a recent Agent Tesla malware campaign targeting US and Australian organizations, which used phishing emails with fake purchase…

11 months ago

Threat Actors Deliver Malware via YouTube Video Game Cracks

Threat actors target home users with information-stealing malware like Vidar, StealC, and Lumma Stealer, which disguises the malware as pirated…

11 months ago

AI Package Hallucination – Hackers Abusing ChatGPT, Gemini to Spread Malware

The research investigates the persistence and scale of AI package hallucination, a technique where LLMs recommend non-existent malicious packages.  The…

11 months ago

Feds Patching Years-Old SS7 Vulnerability in Phone Networks

The FCC's Public Safety and Homeland Security Bureau is seeking input on how communication service providers are securing SS7 and…

11 months ago

AT&T To Face Lawsuit Following Breach Impacting 73 Million Customers

AT&T, a leading American telecommunications company, is facing a wave of lawsuits following a data breach that exposed the sensitive…

11 months ago

Backdoor in upstream xz/liblzma Let Attackers Hack SSH Servers

A startling revelation has identified a dangerous security vulnerability in the xz compression utility, specifically within its liblzma library. This…

11 months ago

DinodasRAT Linux Malware Attack on Linux Servers to Gain Backdoor Access

DinodasRAT, also known as XDealer, is a sophisticated C++ backdoor targeting multiple operating systems. It is designed to enable attackers…

11 months ago

How to Analyse .NET Malware? – Reverse Engineering Snake Keylogger

Utilizing sandbox analysis for behavioral, network, and process examination provides a foundation for reverse engineering .NET malware.  The write-up outlines…

12 months ago

What is Global Threat Intelligence? – SOC/DFIR Team Guide

Global threat intelligence (GTI) is crucial for cybersecurity as it offers real-time data on emerging and persistent cyber threats worldwide.…

12 months ago

Hackers Transform the Raspberry Pi into an Online Anonymity Tool

A new tool, GEOBOX, was advertised on the Dark Web that utilizes Raspberry Pi devices for fraud and anonymization, allowing…

12 months ago