Cyber Attack

PG_MEM – A Malware Hide in Postgres Processes to Steal Data

Cybersecurity researchers at Aqua Nautilus have uncovered a new malware named PG_MEM that targets PostgreSQL databases. This sophisticated malware employs…

7 months ago

Log4j Vulnerability Exploited Again To Deploy Crypto-Mining Malware

Recent attacks exploit the Log4j vulnerability (Log4Shell) by sending obfuscated LDAP requests to trigger malicious script execution, which establishes persistence,…

7 months ago

Developers Beware! Fake Job Offers from Legitimate Github Address

A new phishing campaign is targeting developers by exploiting GitHub's legitimate infrastructure. This sophisticated attack involves fake job offers sent…

7 months ago

MegaMedusa, Highly Scalable Web DDoS Attack Tool Used By Hacker Groups

RipperSec, a pro-Palestinian, pro-Muslim Malaysian hacktivist group, has rapidly grown since its Telegram inception in June 2023.  Leveraging a community…

7 months ago

Iranian APT42 Group Launch A Massive Phishing Campaign To Attack U.S. Presidential Election

APT42 is an APT group that is believed to be backed by the Iranian government, and this group primarily focuses…

7 months ago

Iranian APT42 Actors Conducting World Wide Surveillance Operations

APT42 (aka Damselfly, UNC788, CALANQUE, Charming Kitten) is a sophisticated Iranian state-sponsored cyber espionage group.  This Advanced Persistent Threat (APT)…

7 months ago

Earth Baku Using Customized Tools To Maintain Persistence And Steal Data

Earth Baku, an APT actor who initially focused on the Indo-Pacific region, has grown its activities extensively since late 2022.…

7 months ago

Clickbait PDFs, An Entry point For Multiple Web Based Attacks

Researchers studied the infrastructure behind clickbait PDF attacks by analyzing a large dataset of real-world PDFs to identify clickbait ones…

7 months ago

Hackers Toolkit Unveiled, Comprehensive Tools For Various Cyber Attacks

Hackers always keep updating their tools and add new ones to adapt to evolving security measures, bypass defenses, and exploit…

7 months ago

Critical AWS Services Vulnerability Let Attackers Execute Remote Code

Hackers attack AWS as it hosts a vast number of high-value targets, including sensitive data, business applications, and cloud resources…

7 months ago