Tuesday, January 28, 2025

Sattwik Vaidya

TorNet Backdoor Exploits Windows Scheduled Tasks to Deploy Malware

Cisco Talos researchers have identified an ongoing cyber campaign, active since mid-2024, deploying a previously undocumented backdoor known as "TorNet."This operation, believed to...

Hackers Could Bypassing EDR Using Windows Symbolic Links to Disable Service Executables

A groundbreaking technique for exploiting Windows systems has emerged, combining the "Bring Your Own Vulnerable Driver" (BYOVD) approach with the manipulation of symbolic links....

Microsoft Unveils Phishing Attack Protection for Teams Chat

Microsoft has taken a significant step toward enhancing cybersecurity by introducing a new phishing attack protection feature for Microsoft Teams.The feature aims to safeguard...

Apple Security Update – Patch for iOS Zero-day, MacOS & More

Apple has responded to a newly discovered zero-day vulnerability affecting its operating systems by releasing an array of security updates to protect users from...

Stratoshark – A New Wireshark Tool Released for Cloud

The masterminds behind the revolutionary network analyzer Wireshark have unveiled a new tool, Stratoshark, designed to bring their proven methodology to system call analysis....

Hackers Mimic USPS To Deliver Malicious PDF In Attack Targeted Mobile Devices

In a detailed analysis published on January 27, 2025, Zimperium's zLabs team uncovered a sophisticated phishing campaign targeting mobile devices through malicious PDF files....

New Hacker Group Using 7z & UltraVNC Tool to Deploy Malware Evading Detection

A sophisticated cyber campaign targeting Russian-speaking entities has been identified by cybersecurity researchers, unveiling a deceptive operation imitating the Tactics, Techniques, and Procedures (TTPs)...

Hackers Use Hidden Text Salting to Bypass Spam Filters and Evade Detection

In the latter half of 2024, Cisco Talos identified a significant increase in email threats leveraging "hidden text salting," also referred to as HTML...

Join our community of SUBSCRIBERS and be part of the conversation.

To subscribe, simply enter your email address on our website or click the subscribe button below. Don't worry, we respect your privacy and won't spam your inbox. Your information is safe with us.