Cyber Attack

DarkGate Malware Exploiting Excel Files And SMB File SharesDarkGate Malware Exploiting Excel Files And SMB File Shares

DarkGate Malware Exploiting Excel Files And SMB File Shares

DarkGate, a Malware-as-a-Service (MaaS) platform, experienced a surge in activity since September 2023, employing various distribution methods, including email attachments,…

9 months ago
Advance Auto Parts Cyber Attack: Over 2 Million Users Data ExposedAdvance Auto Parts Cyber Attack: Over 2 Million Users Data Exposed

Advance Auto Parts Cyber Attack: Over 2 Million Users Data Exposed

RALEIGH, NC—Advance Stores Company, Incorporated, a prominent commercial entity in the automotive industry, has recently been the victim of a…

9 months ago
Coyote Banking Trojan Attacking Windows Users To Steal Login DetailsCoyote Banking Trojan Attacking Windows Users To Steal Login Details

Coyote Banking Trojan Attacking Windows Users To Steal Login Details

Hackers use Banking Trojans to steal sensitive financial information. These Trojans can also intercept and modify transactions, allowing hackers to…

9 months ago
Chinese APT40 Is Ready To Exploit New Vulnerabilities Within Hours Of ReleaseChinese APT40 Is Ready To Exploit New Vulnerabilities Within Hours Of Release

Chinese APT40 Is Ready To Exploit New Vulnerabilities Within Hours Of Release

Multiple international cybersecurity agencies jointly warn of a PRC state-sponsored cyber group, linked to the Ministry of State Security and…

9 months ago
Turla Hackers Weaponizing LNK-Files To Deploy Fileless MalwareTurla Hackers Weaponizing LNK-Files To Deploy Fileless Malware

Turla Hackers Weaponizing LNK-Files To Deploy Fileless Malware

Hackers often weaponize LNK files because they can carry malware into systems undetected by anyone. LNK files are shortcuts that,…

9 months ago
Kimusk’s HappyDoor Executed Via regsvr32 File To Evade DetectionKimusk’s HappyDoor Executed Via regsvr32 File To Evade Detection

Kimusk’s HappyDoor Executed Via regsvr32 File To Evade Detection

Kimsuky, also known as the Velvet Chollima, Black Banshee, THALLIUM, or Emerald Sleet, is a North Korean state-sponsored advanced cyber…

9 months ago
Hackers Abused Twilio API To Verify Phone Numbers used For MFAHackers Abused Twilio API To Verify Phone Numbers used For MFA

Hackers Abused Twilio API To Verify Phone Numbers used For MFA

An unauthenticated endpoint vulnerability allowed threat actors to identify phone numbers associated with Authy accounts, which was identified, and the…

9 months ago
FakeBat Malware Weaponizing AnyDesk, Zoom, Teams & ChromeFakeBat Malware Weaponizing AnyDesk, Zoom, Teams & Chrome

FakeBat Malware Weaponizing AnyDesk, Zoom, Teams & Chrome

Hackers target and weaponize AnyDesk, Zoom, Teams, and Chrome as these applications are widely used in a multitude of sectors.…

9 months ago
TotalEnergies Cyber Attack: Data of 210,715 Customers ExposedTotalEnergies Cyber Attack: Data of 210,715 Customers Exposed

TotalEnergies Cyber Attack: Data of 210,715 Customers Exposed

TotalEnergies Clientes SAU has reported a significant cyberattack that has compromised the personal data of 210,715 customers. The incident has…

9 months ago
Rafel RAT Attacking Android Devices To Gain Unauthorized AccessRafel RAT Attacking Android Devices To Gain Unauthorized Access

Rafel RAT Attacking Android Devices To Gain Unauthorized Access

The Rafel RAT is an advanced Android-targeting Remote Access Trojan which poses a great cybersecurity danger. This malicious program has…

9 months ago