BabyShark Malware Delivered through Malicious Excel Macro Documents
Threat actors distributing Visual Basic based BabyShark malware that delivered through spear phishing emails. The emails sent from a public email address disguised to...
Astaroth Trojan Disguises as JPEG, GIF File Abuses OS and Antivirus Process to Steal...
A new unique campaign abuses system native OS process and security software to steal passwords and personal information. Threat actors disguise the Astaroth Trojan...
Key Ways to Stop Hackers From Invading Your Smart Home
If you’re like millions of other people around the world, you have at least one, if not many, smart home products on your property....
Leader of the Hacker Group Jailed for Stealing $15 Million from Russian Banks
Ukrainian man Yuri Lysenko, jailed for organizing a cybercriminal group who committed to doing financial theft and cyber fraud.Lysenko pleads guilty for organizing the...
Commando VM 2.0 – A New Version of Offensive Pentesting VM Updated With ...
Commando VM 2.0, a new version of Windows-based security distribution released for penetration testing community and red teamers with updated hacking tools and new...
Lazarus APT Group Attack Cryptocurrency Exchange using macOS Malware Under the Operation AppleJeus
A cyber espionage APT group called Lazarus hits the cryptocurrency exchanges using fake installer and macOS malware using variously sophisticated techniques.Lazarus group widely known...
Thunderspy Attack – Critical Intel Thunderbolt Bug Let Attackers Hack Millions of PCs Within...
Recently, a security expert at the Eindhoven University of Technology has exhibited that how a new attack method on Windows or Linux computers with...
D-Link Camera Vulnerability let Hackers Hijack the Camera and Tap the Video Streaming
Critical vulnerability in D-Link cloud camera allows attackers to hijack and intercept the camera to see the live video streaming and recorded videos.Researchers discovered...
Load Balancer – How Does it Work With Reconnaissance Phase During Penetration Testing?
Load Balancer basically helps to distribute the network traffic across the multiple servers to improve the network, application performance. the Reconnaissance work on target...
New Dirty Sock Vulnerability Allows Hackers to Gain Root Access on Linux systems
The researcher discovered a new privilege escalation vulnerability called Dirty Sock on Ubuntu Linux default installation lets attacker gain immediate root to the system.This...