Tushar Subhra

Tushar Subhra

NoiseAttack is a Novel Backdoor That Uses Power Spectral Density For EvasionNoiseAttack is a Novel Backdoor That Uses Power Spectral Density For Evasion

NoiseAttack is a Novel Backdoor That Uses Power Spectral Density For Evasion

NoiseAttack is a new method of secretly attacking deep learning models. It uses triggers made from White Gaussian Noise to…

8 months ago
Notorious Mallox Ransomware Evolved From Private Ransomware to RaaSNotorious Mallox Ransomware Evolved From Private Ransomware to RaaS

Notorious Mallox Ransomware Evolved From Private Ransomware to RaaS

Mallox is a sophisticated ransomware that is known for its destructive capabilities and multi-extortion tactics, which include encrypting victims' data…

8 months ago
Earth Lusca Using Multiplatform Backdoor to Attack Windows & Linux MachinesEarth Lusca Using Multiplatform Backdoor to Attack Windows & Linux Machines

Earth Lusca Using Multiplatform Backdoor to Attack Windows & Linux Machines

Earth Lusca is a suspected China-based cyber espionage group active since at least April 2019. Besides this, hackers often target…

8 months ago
Lazarus Hackers Attacking Job-Seekers to Deliver Javascript MalwareLazarus Hackers Attacking Job-Seekers to Deliver Javascript Malware

Lazarus Hackers Attacking Job-Seekers to Deliver Javascript Malware

The Lazarus Group is one of the most notorious hacker groups linked to the North Korean government. The group is known…

8 months ago
ToddyCat APT Abuses SMB, Exploits IKEEXT A Exchange RCE To Deploy ICMP BackdoorToddyCat APT Abuses SMB, Exploits IKEEXT A Exchange RCE To Deploy ICMP Backdoor

ToddyCat APT Abuses SMB, Exploits IKEEXT A Exchange RCE To Deploy ICMP Backdoor

ToddyCat is an APT group that has been active since December 2020, and primarily it targets the government and military…

8 months ago
Versa Director Zero-day Vulnerability Let Attackers Upload Malicious FilesVersa Director Zero-day Vulnerability Let Attackers Upload Malicious Files

Versa Director Zero-day Vulnerability Let Attackers Upload Malicious Files

Versa Networks specializes in successful business. It offers Secure Access Service Edge (SASE), consolidating networking and security services in a…

8 months ago
Cheana Stealer Attacking Windows & macOS VPN Users to Deploy Malware PayloadsCheana Stealer Attacking Windows & macOS VPN Users to Deploy Malware Payloads

Cheana Stealer Attacking Windows & macOS VPN Users to Deploy Malware Payloads

Threat actors exploit phishing websites to distribute malware, often posing as well-known product brands on several platforms in order to…

8 months ago
Digital Wallets Bypassed To Allow Purchase With Stolen CardsDigital Wallets Bypassed To Allow Purchase With Stolen Cards

Digital Wallets Bypassed To Allow Purchase With Stolen Cards

Digital wallets enable users to securely store their financial information on smart devices and perform financial transactions without any hassle.…

9 months ago
BYOVDLL – A New Exploit That Is Bypassing LSASS ProtectionBYOVDLL – A New Exploit That Is Bypassing LSASS Protection

BYOVDLL – A New Exploit That Is Bypassing LSASS Protection

In July 2022, Microsoft patched a well-known PPL bypass flaw, initially discovered by Ionescu and Forshaw.  This allowed protection circumvention…

9 months ago
Iranian APT42 Actors Conducting World Wide Surveillance OperationsIranian APT42 Actors Conducting World Wide Surveillance Operations

Iranian APT42 Actors Conducting World Wide Surveillance Operations

APT42 (aka Damselfly, UNC788, CALANQUE, Charming Kitten) is a sophisticated Iranian state-sponsored cyber espionage group.  This Advanced Persistent Threat (APT)…

9 months ago