Cyber Attack

Octo Tempest Know for Attacking VMWare ESXi Servers Added RansomHub & Qilin to Its ArsenalOcto Tempest Know for Attacking VMWare ESXi Servers Added RansomHub & Qilin to Its Arsenal

Octo Tempest Know for Attacking VMWare ESXi Servers Added RansomHub & Qilin to Its Arsenal

Threat actors often attack VMware ESXi servers since they accommodate many virtual machines, which link to a variety of systems…

9 months ago
TAG-100 Actors Using Open-Source Tools To Attack Gov & Private OrgsTAG-100 Actors Using Open-Source Tools To Attack Gov & Private Orgs

TAG-100 Actors Using Open-Source Tools To Attack Gov & Private Orgs

Hackers exploit open-source tools to execute attacks because they are readily available, well-documented, and often have extensive community support, making…

9 months ago
macOS Users Beware Of Weaponized Meeting App From North Korean HackersmacOS Users Beware Of Weaponized Meeting App From North Korean Hackers

macOS Users Beware Of Weaponized Meeting App From North Korean Hackers

Meeting apps are often targeted and turned into weapons by hackers as they are largely employed for communication and collaboration,…

9 months ago
Hackers Exploiting Legitimate RMM Tools With BugSleep MalwareHackers Exploiting Legitimate RMM Tools With BugSleep Malware

Hackers Exploiting Legitimate RMM Tools With BugSleep Malware

Since October 2023, MuddyWater, which is an Iranian threat group linked to MOIS, has escalated its phishing campaigns in Middle…

9 months ago
Volcano Demon Group Attacking Organizations With LukaLocker RansomwareVolcano Demon Group Attacking Organizations With LukaLocker Ransomware

Volcano Demon Group Attacking Organizations With LukaLocker Ransomware

The Volcano Demon group has been discovered spreading a new ransomware called LukaLocker, which targets Idealease Inc., a truck leasing…

9 months ago
MirrorFace Attacking Organizations Exploiting Vulnerabilities In Internet-Facing AssetsMirrorFace Attacking Organizations Exploiting Vulnerabilities In Internet-Facing Assets

MirrorFace Attacking Organizations Exploiting Vulnerabilities In Internet-Facing Assets

MirrorFace threat actors have been targeting media, political organizations, and academic institutions since 2022, shifting focus to manufacturers and research…

9 months ago
New Poco RAT Weaponizing 7zip Files Using Google DriveNew Poco RAT Weaponizing 7zip Files Using Google Drive

New Poco RAT Weaponizing 7zip Files Using Google Drive

The hackers weaponize 7zip files to pass through security measures and deliver malware effectively. These archived files can hide malicious…

9 months ago
ViperSoftX Weaponizing AutoIt & CLR For Stealthy PowerShell ExecutionViperSoftX Weaponizing AutoIt & CLR For Stealthy PowerShell Execution

ViperSoftX Weaponizing AutoIt & CLR For Stealthy PowerShell Execution

ViperSoftX is an advanced malware that has become more complicated since its recognition in 2020, to the extent that eBooks…

9 months ago
Malicious NuGet Campaign Tricking Developers To Inject Malicious CodeMalicious NuGet Campaign Tricking Developers To Inject Malicious Code

Malicious NuGet Campaign Tricking Developers To Inject Malicious Code

Hackers often target NuGet as it's a popular package manager for .NET, which developers widely use to share and consume…

9 months ago
Akira Ransomware Attacking Airline Industry With Legitimate ToolsAkira Ransomware Attacking Airline Industry With Legitimate Tools

Akira Ransomware Attacking Airline Industry With Legitimate Tools

Airlines often become the target of hackers as they contain sensitive personal and financial details of passengers as well as…

9 months ago