Raga Varshini

Raga Varshini

Hackers Registered 500k+ Domains Using Algorithms For Extensive Cyber AttackHackers Registered 500k+ Domains Using Algorithms For Extensive Cyber Attack

Hackers Registered 500k+ Domains Using Algorithms For Extensive Cyber Attack

Hackers often register new domains for phishing attacks, spreading malware, and other deceitful activities.  Such domains are capable of pretending…

10 months ago
Beware Of Fake Browser Updates That Installs Malicious BOINC InfrastructreBeware Of Fake Browser Updates That Installs Malicious BOINC Infrastructre

Beware Of Fake Browser Updates That Installs Malicious BOINC Infrastructre

SocGholish malware, also known as FakeUpdates, has exhibited new behavior since July 4th, 2024, as the infection chain still begins…

10 months ago
Akira Ransomware Attacking Airline Industry With Legitimate ToolsAkira Ransomware Attacking Airline Industry With Legitimate Tools

Akira Ransomware Attacking Airline Industry With Legitimate Tools

Airlines often become the target of hackers as they contain sensitive personal and financial details of passengers as well as…

10 months ago
Europol Concerns Over Privacy Enhancing Technologies Challenge Lawful InterceptionEuropol Concerns Over Privacy Enhancing Technologies Challenge Lawful Interception

Europol Concerns Over Privacy Enhancing Technologies Challenge Lawful Interception

A new position paper argues that Privacy Enhancing Technologies (PET) used in Home Routing are making it difficult for law…

10 months ago
Hackers Abused Twilio API To Verify Phone Numbers used For MFAHackers Abused Twilio API To Verify Phone Numbers used For MFA

Hackers Abused Twilio API To Verify Phone Numbers used For MFA

An unauthenticated endpoint vulnerability allowed threat actors to identify phone numbers associated with Authy accounts, which was identified, and the…

10 months ago
Xeno RAT Attacking Users Via GitHub Repository And .gg DomainsXeno RAT Attacking Users Via GitHub Repository And .gg Domains

Xeno RAT Attacking Users Via GitHub Repository And .gg Domains

Threat actors use RATs because they provide attackers with persistent access to compromised systems, enabling long-term espionage and exploitation. North…

10 months ago
4 Leading Methods of Increasing Business Efficiency 4 Leading Methods of Increasing Business Efficiency 

4 Leading Methods of Increasing Business Efficiency

The more efficient your core business operations, the more motivated and productive your employees and as a direct result, the…

10 months ago
Mailcow Mail Server Vulnerability Let Attackers Execute Remote CodeMailcow Mail Server Vulnerability Let Attackers Execute Remote Code

Mailcow Mail Server Vulnerability Let Attackers Execute Remote Code

Two critical vulnerabilities (CVE-2024-31204 and CVE-2024-30270) affecting Mailcow versions before 2024-04 allow attackers to execute arbitrary code on the server.…

11 months ago
New ARM ‘TIKTAG’ Attack Impacts Google Chrome, Linux SystemsNew ARM ‘TIKTAG’ Attack Impacts Google Chrome, Linux Systems

New ARM ‘TIKTAG’ Attack Impacts Google Chrome, Linux Systems

Memory corruption lets attackers hijack control flow, execute code, elevate privileges, and leak data. ARM's Memory Tagging Extension (MTE) aims…

11 months ago
Fog Ransomware Attacking Windows Servers Administrators To Steal RDP LoginsFog Ransomware Attacking Windows Servers Administrators To Steal RDP Logins

Fog Ransomware Attacking Windows Servers Administrators To Steal RDP Logins

A new ransomware variant dubbed ‘Fog’ has been spotted targeting US businesses in the education and recreation sectors. Forensic data…

11 months ago