Sneka

Sneka

UNC1151 Hackers Weaponizing Excel Documents To Attack Windows MachineUNC1151 Hackers Weaponizing Excel Documents To Attack Windows Machine

UNC1151 Hackers Weaponizing Excel Documents To Attack Windows Machine

Mandiant identified a UNC1151 information campaign targeting Ukraine, Lithuania, Latvia, and Poland with disinformation, as CRIL linked a recent malicious…

10 months ago
Hackers Attacking Banking Customers Using Phishing-As-A-Service V3B ToolkitHackers Attacking Banking Customers Using Phishing-As-A-Service V3B Toolkit

Hackers Attacking Banking Customers Using Phishing-As-A-Service V3B Toolkit

A cybercriminal group is selling and distributing a sophisticated phishing kit called "V3B" through Phishing-as-a-Service (PhaaS) and self-hosting methods, which…

10 months ago
Beware Of Phishing Emails Prompting Execution Via Paste (CTRL+V)Beware Of Phishing Emails Prompting Execution Via Paste (CTRL+V)

Beware Of Phishing Emails Prompting Execution Via Paste (CTRL+V)

Phishing attackers are distributing malicious HTML files as email attachments, containing code designed to exploit users by prompting them to…

10 months ago
Hackers Weaponizing MS Office-Cracked Versions to Deliver MalwareHackers Weaponizing MS Office-Cracked Versions to Deliver Malware

Hackers Weaponizing MS Office-Cracked Versions to Deliver Malware

Attackers in South Korea are distributing malware disguised as cracked software, including RATs and crypto miners, and registering themselves with…

10 months ago
Cloud-Based Malware Attack Abusing Google Drive & DropboxCloud-Based Malware Attack Abusing Google Drive & Dropbox

Cloud-Based Malware Attack Abusing Google Drive & Dropbox

A phishing email with a malicious zip attachment initiates the attack. The zip contains a single executable disguised as an…

10 months ago
Millions Of IoT Devices Vulnerable To Attacks Leads To Full TakeoverMillions Of IoT Devices Vulnerable To Attacks Leads To Full Takeover

Millions Of IoT Devices Vulnerable To Attacks Leads To Full Takeover

Researchers discovered four significant vulnerabilities in the ThroughTek Kalay Platform, which powers 100 million IoT-enabled devices. Notably, ThroughTek Kalay's influence…

11 months ago
Hackers Group Claims To Have Broke Into IDF & Stolen DocumentsHackers Group Claims To Have Broke Into IDF & Stolen Documents

Hackers Group Claims To Have Broke Into IDF & Stolen Documents

Anonymous claims a successful cyberattack against the Israeli Defence Force (IDF), gaining access to 20 gigabytes of data, which allegedly…

11 months ago
Indian Govt Rescues 250 Citizens Trapped In Cambodia Forced Into Cyber-SlaveryIndian Govt Rescues 250 Citizens Trapped In Cambodia Forced Into Cyber-Slavery

Indian Govt Rescues 250 Citizens Trapped In Cambodia Forced Into Cyber-Slavery

A massive cyber fraud operation targeting Indians in Cambodia has emerged, with an estimated Rs 500 crore stolen in six…

12 months ago
Chinese Hackers Attacking Southeast Asian Nations With Malware PackagesChinese Hackers Attacking Southeast Asian Nations With Malware Packages

Chinese Hackers Attacking Southeast Asian Nations With Malware Packages

Cybersecurity researchers at Unit 42 have uncovered a sophisticated cyberespionage campaign orchestrated by two Chinese Advanced Persistent Threat (APT) groups…

1 year ago
Microsoft To Ban 50+ Products For Users In RussiaMicrosoft To Ban 50+ Products For Users In Russia

Microsoft To Ban 50+ Products For Users In Russia

Softline Group, a major IT solutions provider, has confirmed the suspension of access to cloud products offered by Microsoft, Amazon,…

1 year ago