Balaji

Balaji

New ManticoraLoader – Malware Attacking Citrix Users To Steal DataNew ManticoraLoader – Malware Attacking Citrix Users To Steal Data

New ManticoraLoader – Malware Attacking Citrix Users To Steal Data

Cyble Research & Intelligence Labs has recently found information about a new type of malware-as-a-service (MaaS) called 'ManticoraLoader' in some…

7 months ago
Head Mare Hacktivist Group Exploit WinRAR Vulnerability To Encrypt Windows And LinuxHead Mare Hacktivist Group Exploit WinRAR Vulnerability To Encrypt Windows And Linux

Head Mare Hacktivist Group Exploit WinRAR Vulnerability To Encrypt Windows And Linux

Head Mare, a Russian-focused hacktivist group, gained notoriety in 2023 by targeting organizations in Russia and Belarus as they employ…

7 months ago
Researchers Detailed Russian Hacktivist/State Hackers TacticsResearchers Detailed Russian Hacktivist/State Hackers Tactics

Researchers Detailed Russian Hacktivist/State Hackers Tactics

The People's Cyber Army of Russia is a Russian hacktivist group known for its strategic use of DDoS attacks and…

7 months ago
BlackByte Hackers Exploiting VMware ESXi Auth Bypass VulnerabilityBlackByte Hackers Exploiting VMware ESXi Auth Bypass Vulnerability

BlackByte Hackers Exploiting VMware ESXi Auth Bypass Vulnerability

BlackByte, a Ransomware-as-a-Service (RaaS) group that surfaced about mid-2021 appears to have traces of Conti's evolution. It uses productive sophistication…

7 months ago
SafeTech Labs Takes Aim at $52B Digital Legacy Industry with World’s First Fully Comprehensive Digital Legacy SolutionSafeTech Labs Takes Aim at $52B Digital Legacy Industry with World’s First Fully Comprehensive Digital Legacy Solution

SafeTech Labs Takes Aim at $52B Digital Legacy Industry with World’s First Fully Comprehensive Digital Legacy Solution

The company’s new product covers every base for digital legacies, resulting in the industry’s first truly comprehensive product. SafeTech Labs,…

7 months ago
Hackers Toolkit Unveiled, Comprehensive Tools For Various Cyber AttacksHackers Toolkit Unveiled, Comprehensive Tools For Various Cyber Attacks

Hackers Toolkit Unveiled, Comprehensive Tools For Various Cyber Attacks

Hackers always keep updating their tools and add new ones to adapt to evolving security measures, bypass defenses, and exploit…

8 months ago
Why Is It Crucial to Implement Clinic Management Software?Why Is It Crucial to Implement Clinic Management Software?

Why Is It Crucial to Implement Clinic Management Software?

Walking into a clinic that’s organized and efficient feels great, right? Everything runs smoothly, but behind that smooth operation is…

8 months ago
Confusion Attacks Vulnerability In Apache HTTP Server Allow Attackers To Gain Root Access RemotelyConfusion Attacks Vulnerability In Apache HTTP Server Allow Attackers To Gain Root Access Remotely

Confusion Attacks Vulnerability In Apache HTTP Server Allow Attackers To Gain Root Access Remotely

The Apache HTTP Server relies on hundreds of independently developed modules to handle client requests, sharing a complex data structure…

8 months ago
New APT Actor240524 Weaponizing Official Documents To Deliver MalwareNew APT Actor240524 Weaponizing Official Documents To Deliver Malware

New APT Actor240524 Weaponizing Official Documents To Deliver Malware

A new APT group, dubbed Actor240524, launched a spear-phishing campaign targeting Azerbaijani and Israeli diplomats on July 1, 2024, where…

8 months ago
GhostWrite Vulnerability Let Hackers Read And Write Any Part Of The Computer’s MemoryGhostWrite Vulnerability Let Hackers Read And Write Any Part Of The Computer’s Memory

GhostWrite Vulnerability Let Hackers Read And Write Any Part Of The Computer’s Memory

Such is the industry, that RISC-V, an open and extensible instruction set architecture (ISA) has now invaded the CPU market,…

8 months ago