Balaji

Balaji

Apple Fixes New Kernel Zero-Day Bug That Attacks iPhones, iPads RemotelyApple Fixes New Kernel Zero-Day Bug That Attacks iPhones, iPads Remotely

Apple Fixes New Kernel Zero-Day Bug That Attacks iPhones, iPads Remotely

Since the start of this year, there have been 8 zero-day vulnerabilities discovered by Apple that have been used to…

2 years ago
OldGremlin Hacker Group Expanded Toolkit With Dedicated Linux RansomwareOldGremlin Hacker Group Expanded Toolkit With Dedicated Linux Ransomware

OldGremlin Hacker Group Expanded Toolkit With Dedicated Linux Ransomware

It appears that 16 malicious campaigns have been carried out by a Russian-speaking ransomware group called OldGremlin (aka TinyScouts).  A…

2 years ago
Microsoft Data Leak – 2.4TB of 65,000+ Companies Data Leaked OnlineMicrosoft Data Leak – 2.4TB of 65,000+ Companies Data Leaked Online

Microsoft Data Leak – 2.4TB of 65,000+ Companies Data Leaked Online

Recently, Microsoft has confirmed that due to a misconfiguration of Microsoft server multiple sensitive information about some of Microsoft's customers…

2 years ago
Mitsu Malware Stealer Downloaded Through AnyDesk Phishing Site to Steal PasswordsMitsu Malware Stealer Downloaded Through AnyDesk Phishing Site to Steal Passwords

Mitsu Malware Stealer Downloaded Through AnyDesk Phishing Site to Steal Passwords

Cybersecurity experts at Cyble Research and Intelligence Labs (CRIL) have recently identified a fake AnyDesk website (hxxp://anydesk[.]ml).  They found this…

2 years ago
Critical RCE Flaw Found in Popular Post-Exploitation Cobalt Strike ToolkitCritical RCE Flaw Found in Popular Post-Exploitation Cobalt Strike Toolkit

Critical RCE Flaw Found in Popular Post-Exploitation Cobalt Strike Toolkit

Recently, a brand-new out-of-band security update (Cobalt Strike 4.7.2) has been released by HelpSystems to fix an RCE vulnerability in…

2 years ago
Black Basta Ransomware Gang Infiltrates Networks Using Penetration Testing ToolsBlack Basta Ransomware Gang Infiltrates Networks Using Penetration Testing Tools

Black Basta Ransomware Gang Infiltrates Networks Using Penetration Testing Tools

The distribution of QAKBOT malware is resurrected once again by operators of the Black Basta ransomware group on September 8,…

2 years ago
RedEye – CISA Developed Open-source Red Team Tool Monitoring C&C Server ActivitiesRedEye – CISA Developed Open-source Red Team Tool Monitoring C&C Server Activities

RedEye – CISA Developed Open-source Red Team Tool Monitoring C&C Server Activities

A new open-source analytical tool dubbed RedEye designed to make it easier for operators to visualize and report activities associated…

2 years ago
Magniber Ransomware Weaponize JavaScript to Attack Windows UsersMagniber Ransomware Weaponize JavaScript to Attack Windows Users

Magniber Ransomware Weaponize JavaScript to Attack Windows Users

Recently, the security researchers at HP's threat intelligence team have discovered a malicious campaign in which the threat actors are…

2 years ago
Weaponized Mod WhatsApp Version “YoWhatsApp” Attempt to Hack Android DevicesWeaponized Mod WhatsApp Version “YoWhatsApp” Attempt to Hack Android Devices

Weaponized Mod WhatsApp Version “YoWhatsApp” Attempt to Hack Android Devices

Cybersecurity researchers at Kaspersky Security Labs have recently identified an unofficial version of WhatsApp for Android, which is dubbed by…

2 years ago
Android Device Leaks Traffic When Connected to WiFi Network Even ‘Always-on VPN’ is EnabledAndroid Device Leaks Traffic When Connected to WiFi Network Even ‘Always-on VPN’ is Enabled

Android Device Leaks Traffic When Connected to WiFi Network Even ‘Always-on VPN’ is Enabled

The installation of a VPN on your Android phone is supposed to ensure that all outgoing traffic is protected. This…

2 years ago