Gurubaran

Gurubaran

Ransomhub Attacked 210 Victims Since Feb 2024, CISA Released Advisory For DefendersRansomhub Attacked 210 Victims Since Feb 2024, CISA Released Advisory For Defenders

Ransomhub Attacked 210 Victims Since Feb 2024, CISA Released Advisory For Defenders

The FBI, CISA, MS-ISAC, and HHS have released a joint advisory detailing known RansomHub ransomware indicators of compromise (IOCs) and…

8 months ago
Iranian Hackers Using Multi-Stage Malware To Attack Govt And Defense Sectors Via LinkedInIranian Hackers Using Multi-Stage Malware To Attack Govt And Defense Sectors Via LinkedIn

Iranian Hackers Using Multi-Stage Malware To Attack Govt And Defense Sectors Via LinkedIn

Microsoft has identified a new Iranian state-sponsored threat actor, Peach Sandstorm, deploying a custom multi-stage backdoor named Tickler.  This backdoor…

8 months ago
Research Unveils Eight Android And iOS That Leaks Users Sensitive DataResearch Unveils Eight Android And iOS That Leaks Users Sensitive Data

Research Unveils Eight Android And iOS That Leaks Users Sensitive Data

The eight Android and iOS apps fail to adequately protect user data, which transmits sensitive information, such as device details,…

8 months ago
Face Check With Microsoft Entra Verified ID Is Now Generally Available, MicrosoftFace Check With Microsoft Entra Verified ID Is Now Generally Available, Microsoft

Face Check With Microsoft Entra Verified ID Is Now Generally Available, Microsoft

Microsoft announced that Face Check with Microsoft Entra Verified ID is now generally accessible. It is available standalone and as…

9 months ago
Clickbait PDFs, An Entry point For Multiple Web Based AttacksClickbait PDFs, An Entry point For Multiple Web Based Attacks

Clickbait PDFs, An Entry point For Multiple Web Based Attacks

Researchers studied the infrastructure behind clickbait PDF attacks by analyzing a large dataset of real-world PDFs to identify clickbait ones…

9 months ago
0.0.0.0 Day – 18 Yr Old Vulnerability Allow Attackers to Bypass All Browser Security0.0.0.0 Day – 18 Yr Old Vulnerability Allow Attackers to Bypass All Browser Security

0.0.0.0 Day – 18 Yr Old Vulnerability Allow Attackers to Bypass All Browser Security

Threat actors often target and exploit security flaws in web browsers, as exploiting flaws in web browsers enables them to…

9 months ago
Hackers Exploit iOS Settings to Trigger Fake iOS Updates on Hijacked DevicesHackers Exploit iOS Settings to Trigger Fake iOS Updates on Hijacked Devices

Hackers Exploit iOS Settings to Trigger Fake iOS Updates on Hijacked Devices

A sophisticated mobile attack vector involves a deceptive iOS update that masquerades as the legitimate iOS 18, tricking users into…

9 months ago
DISPOSSESSOR And RADAR Ransomware Emerging With RaaS ModelDISPOSSESSOR And RADAR Ransomware Emerging With RaaS Model

DISPOSSESSOR And RADAR Ransomware Emerging With RaaS Model

Ransomware affiliates are forming alliances to recoup losses from unreliable partners. A prominent example involves ALPHV extorting $22 million from…

9 months ago
Exodus Underground Market Place Emerging As A Heaven For CybercriminalsExodus Underground Market Place Emerging As A Heaven For Cybercriminals

Exodus Underground Market Place Emerging As A Heaven For Cybercriminals

The Exodus Market, a haven for exiled criminals, has grown to become a significant player in the black market economy.…

9 months ago
Critical OpenSSH “regreSSHion” Vulnerability Impacted macOS  Systems, Patch NowCritical OpenSSH “regreSSHion” Vulnerability Impacted macOS  Systems, Patch Now

Critical OpenSSH “regreSSHion” Vulnerability Impacted macOS  Systems, Patch Now

A serious flaw in OpenSSH servers, dubbed "regreSSHion," affects macOS systems and could allow a remote attacker to execute arbitrary…

9 months ago