Balaji

Balaji

GTPDOOR – Previously Unknown Linux Malware Attack Telecom NetworksGTPDOOR – Previously Unknown Linux Malware Attack Telecom Networks

GTPDOOR – Previously Unknown Linux Malware Attack Telecom Networks

Researchers have discovered a new backdoor named GTPDOOR that targets telecommunication network systems within the closed GRX network, which connects…

1 year ago
US Court Orders NSO Group to Handover Code for Spyware, Pegasus to WhatsAppUS Court Orders NSO Group to Handover Code for Spyware, Pegasus to WhatsApp

US Court Orders NSO Group to Handover Code for Spyware, Pegasus to WhatsApp

Meta, the company that owns WhatsApp, filed a lawsuit against NSO Group in 2019. The lawsuit claims that NSO took…

1 year ago
New SSO-Based Phishing Attack Trick Users into Sharing Login Credentials  New SSO-Based Phishing Attack Trick Users into Sharing Login Credentials  

New SSO-Based Phishing Attack Trick Users into Sharing Login Credentials

Threat actors employ phishing scams to trick individuals into giving away important details like login credentials or financial data.  It…

1 year ago
Lazarus Hackers Exploited Windows 0-Day to Gain Kernel read/write AccessLazarus Hackers Exploited Windows 0-Day to Gain Kernel read/write Access

Lazarus Hackers Exploited Windows 0-Day to Gain Kernel read/write Access

The Lazarus Group, a well-known cybercriminal organization, has recently exploited a zero-day vulnerability in Windows to gain kernel privileges, a…

1 year ago
PyRIT – A Red Team Tool From Microsoft For Generative AI SystemsPyRIT – A Red Team Tool From Microsoft For Generative AI Systems

PyRIT – A Red Team Tool From Microsoft For Generative AI Systems

In a significant move to bolster the security of generative AI systems, Microsoft has announced the release of an open…

1 year ago
Grandoreiro Banking Malware Infrastructure Seized by AuthoritiesGrandoreiro Banking Malware Infrastructure Seized by Authorities

Grandoreiro Banking Malware Infrastructure Seized by Authorities

The Grandoreiro, a criminal organization that uses banking malware to commit electronic banking fraud against Spain, Mexico, Brazil, and Argentina,…

1 year ago
Pure Malware Tools Pose As Legitimate Software to Bypass AV DetectionsPure Malware Tools Pose As Legitimate Software to Bypass AV Detections

Pure Malware Tools Pose As Legitimate Software to Bypass AV Detections

An extensive examination of the growing danger posed by the Pure malware family has been released, providing the industry with…

1 year ago
Hackers Abuse GitHub to Host Malicious InfrastructureHackers Abuse GitHub to Host Malicious Infrastructure

Hackers Abuse GitHub to Host Malicious Infrastructure

GitHub has become a major platform that cybercriminals use for various attack methods such as payload delivery, dead drop resolution…

1 year ago
Hackers Actively Exploited 2 Ivanti Zero-Day to Execute Arbitrary CommandsHackers Actively Exploited 2 Ivanti Zero-Day to Execute Arbitrary Commands

Hackers Actively Exploited 2 Ivanti Zero-Day to Execute Arbitrary Commands

Invati Connect Secure (ICS) and Ivanti Policy Secure Gateways have been discovered with two new vulnerabilities associated with authentication bypass…

1 year ago
Mirai-Based NoaBot Launches a DDoS Attack on Linux DevicesMirai-Based NoaBot Launches a DDoS Attack on Linux Devices

Mirai-Based NoaBot Launches a DDoS Attack on Linux Devices

Hackers use the Mirai botnet to launch large-scale Distributed Denial of Service (DDoS) attacks by exploiting vulnerable Internet of Things…

1 year ago