Raga Varshini

Raga Varshini

Varshini is a Cyber Security expert in Threat Analysis, Vulnerability Assessment, and Research. Passionate about staying ahead of emerging Threats and Technologies.
Critical Atlassian Vulnerability Exploited To Connect Servers In Mining NetworksCritical Atlassian Vulnerability Exploited To Connect Servers In Mining Networks

Critical Atlassian Vulnerability Exploited To Connect Servers In Mining Networks

Hackers usually shift their attention towards Atlassian due to flaws in its software, especially in products like Confluence, which put…

7 months ago
Operation DevilTiger, APT Hackers 0-Day Exploitation Tactics ExposedOperation DevilTiger, APT Hackers 0-Day Exploitation Tactics Exposed

Operation DevilTiger, APT Hackers 0-Day Exploitation Tactics Exposed

The APT-Q-12 group, also known as Pseudo Hunter, is a Northeast Asian threat actor linked to Darkhotel, which primarily targets…

7 months ago
MegaMedusa, Highly Scalable Web DDoS Attack Tool Used By Hacker GroupsMegaMedusa, Highly Scalable Web DDoS Attack Tool Used By Hacker Groups

MegaMedusa, Highly Scalable Web DDoS Attack Tool Used By Hacker Groups

RipperSec, a pro-Palestinian, pro-Muslim Malaysian hacktivist group, has rapidly grown since its Telegram inception in June 2023.  Leveraging a community…

8 months ago
Iranian APT42 Group Launch A Massive Phishing Campaign To Attack U.S. Presidential ElectionIranian APT42 Group Launch A Massive Phishing Campaign To Attack U.S. Presidential Election

Iranian APT42 Group Launch A Massive Phishing Campaign To Attack U.S. Presidential Election

APT42 is an APT group that is believed to be backed by the Iranian government, and this group primarily focuses…

8 months ago
Threat Actors Exploiting Windows Systems To Deploy Multiple MalwaresThreat Actors Exploiting Windows Systems To Deploy Multiple Malwares

Threat Actors Exploiting Windows Systems To Deploy Multiple Malwares

A sophisticated phishing campaign targeting Windows systems leverages multiple evasion techniques, including Python obfuscation, shellcode generation, and loading, to deploy…

8 months ago
North Korean Hackers Exploit VPN Update Flaw To Breach NetworksNorth Korean Hackers Exploit VPN Update Flaw To Breach Networks

North Korean Hackers Exploit VPN Update Flaw To Breach Networks

North Korean state-sponsored hacking groups, including Kimsuky (APT43) and Andariel (APT45), have significantly increased cyberattacks on South Korean construction and…

8 months ago
Panamorfi TCP flood DDoS Attack Targeting Jupyter NotebooksPanamorfi TCP flood DDoS Attack Targeting Jupyter Notebooks

Panamorfi TCP flood DDoS Attack Targeting Jupyter Notebooks

An attacker, identified as Yawixooo, leveraged a publicly accessible Jupyter Notebook honeypot as an initial access vector. The honeypot's exposure…

8 months ago
Beware Of Fake AI Editor Website That Steals Your Login CredentialsBeware Of Fake AI Editor Website That Steals Your Login Credentials

Beware Of Fake AI Editor Website That Steals Your Login Credentials

Hackers often make use of fake AI editor websites for several illicit purposes with malicious intent.  Among their prime activities…

8 months ago
Beware Of Malicious Python Packages That Steal Users Sensitive DataBeware Of Malicious Python Packages That Steal Users Sensitive Data

Beware Of Malicious Python Packages That Steal Users Sensitive Data

Malicious Python packages uploaded by "dsfsdfds" to PyPI infiltrated user systems by exfiltrating sensitive data to a Telegram bot likely…

8 months ago
Beware Of Dating Apps Exposing Your Personal And Location Details To Cyber CriminalsBeware Of Dating Apps Exposing Your Personal And Location Details To Cyber Criminals

Beware Of Dating Apps Exposing Your Personal And Location Details To Cyber Criminals

Threat actors often attack dating apps to steal personal data, including sensitive data and location details, which can be used…

8 months ago