Raga Varshini

Raga Varshini

Ransomware Group Creation Touched Yearly All Time HighRansomware Group Creation Touched Yearly All Time High

Ransomware Group Creation Touched Yearly All Time High

The ransomware landscape is rapidly diversifying in 2024, with a surge in new extortion groups as established attackers continue to…

11 months ago
Kinsing Malware Attacking Apache Tomcat Servers To Deploy CryptominersKinsing Malware Attacking Apache Tomcat Servers To Deploy Cryptominers

Kinsing Malware Attacking Apache Tomcat Servers To Deploy Cryptominers

Kinsing malware, known for exploiting vulnerabilities on Linux cloud servers to deploy backdoors and cryptominers, has recently expanded its target…

12 months ago
ArubaOS Critical Vulnerability Let Attackers Execute Remote CodeArubaOS Critical Vulnerability Let Attackers Execute Remote Code

ArubaOS Critical Vulnerability Let Attackers Execute Remote Code

Multiple vulnerabilities have been discovered in ArubaOS that affect HPE Aruba Networking devices, including Mobility Conductor, Mobility Controllers WLAN Gateways,…

1 year ago
Beware Of Weaponized Zip Files That Deliver WINELOADER MalwareBeware Of Weaponized Zip Files That Deliver WINELOADER Malware

Beware Of Weaponized Zip Files That Deliver WINELOADER Malware

APT29, a Russian threat group, targeted German political parties with a new backdoor called WINELOADER using spear-phishing emails containing malicious…

1 year ago
Russian APT44 – The Most Notorious Cyber Sabotage Group GloballyRussian APT44 – The Most Notorious Cyber Sabotage Group Globally

Russian APT44 – The Most Notorious Cyber Sabotage Group Globally

As Russia's invasion of Ukraine enters its third year, the formidable Sandworm (aka FROZENBARENTS, APT44) cyber threat group remains highly…

1 year ago
SoumniBot Exploiting Android Manifest Flaws to Evade DetectionSoumniBot Exploiting Android Manifest Flaws to Evade Detection

SoumniBot Exploiting Android Manifest Flaws to Evade Detection

A new banker, SoumniBot, has recently been identified. It targets Korean users and is incredible by using an unusual method…

1 year ago
Pentagon Releases Cybersecurity Strategy To Strengthen Defense Industrial Base Pentagon Releases Cybersecurity Strategy To Strengthen Defense Industrial Base 

Pentagon Releases Cybersecurity Strategy To Strengthen Defense Industrial Base

The DoD DIB Cybersecurity Strategy is a three-year plan (FY24-27) to improve cybersecurity for defense contractors that aims to create…

1 year ago
Beware Of Weaponized Air Force invitation PDF Targeting Indian Defense And Energy SectorsBeware Of Weaponized Air Force invitation PDF Targeting Indian Defense And Energy Sectors

Beware Of Weaponized Air Force invitation PDF Targeting Indian Defense And Energy Sectors

EclecticIQ cybersecurity researchers have uncovered a cyberespionage operation dubbed "Operation FlightNight" targeting Indian government entities and energy companies.  The attackers,…

1 year ago
Google Revealed Kernel Address Sanitizer To Harden Android Firmware And BeyondGoogle Revealed Kernel Address Sanitizer To Harden Android Firmware And Beyond

Google Revealed Kernel Address Sanitizer To Harden Android Firmware And Beyond

Android devices are popular among hackers due to the platform’s extensive acceptance and open-source nature. However, it has a big…

1 year ago
WordPress Gutenberg Editor: Mastering the Block-Based Editing ExperienceWordPress Gutenberg Editor: Mastering the Block-Based Editing Experience

WordPress Gutenberg Editor: Mastering the Block-Based Editing Experience

WordPress Gutenberg Editor represents a significant shift in creating and managing content within the WordPress ecosystem. Traditionally, WordPress users relied…

1 year ago