Cyber Attack

Turla Hackers Weaponizing LNK-Files To Deploy Fileless Malware

Hackers often weaponize LNK files because they can carry malware into systems undetected by anyone. LNK files are shortcuts that,…

6 months ago

Kimusk’s HappyDoor Executed Via regsvr32 File To Evade Detection

Kimsuky, also known as the Velvet Chollima, Black Banshee, THALLIUM, or Emerald Sleet, is a North Korean state-sponsored advanced cyber…

6 months ago

Hackers Abused Twilio API To Verify Phone Numbers used For MFA

An unauthenticated endpoint vulnerability allowed threat actors to identify phone numbers associated with Authy accounts, which was identified, and the…

6 months ago

FakeBat Malware Weaponizing AnyDesk, Zoom, Teams & Chrome

Hackers target and weaponize AnyDesk, Zoom, Teams, and Chrome as these applications are widely used in a multitude of sectors.…

6 months ago

TotalEnergies Cyber Attack: Data of 210,715 Customers Exposed

TotalEnergies Clientes SAU has reported a significant cyberattack that has compromised the personal data of 210,715 customers. The incident has…

6 months ago

Rafel RAT Attacking Android Devices To Gain Unauthorized Access

The Rafel RAT is an advanced Android-targeting Remote Access Trojan which poses a great cybersecurity danger. This malicious program has…

6 months ago

Hackers Using Polyglot Files In the Wild, Here Comes PolyConv For Detection

Polyglot files have to fit in several file format specifications and respond differently depending on the calling program. This poses…

6 months ago

CapraRAT Mimics As Popular Android Apps Attacking Android Users

Transparent Tribe (aka APT36) has been active since 2016, focusing on social engineering strategies to target Indian government and military…

6 months ago

Hackers Using Dropbox And Google Docs To Deliver Orcinius Malware

A new Orcinius Trojan has been discovered, employing VBA Stomping to hide its infection. The multi-stage trojan uses Dropbox and…

6 months ago

Grasshopper Hackers Mimic As Penetration Testing Service To Deploy Malware

Hackers often mimic penetration testing services to disguise their malicious activities as legitimate security assessments.  By imitating authorized security testing,…

6 months ago