Cyber Attack

New Banking Attacking Users of Indian banks to Steal Aadhar, PAN, ATM & Credit Card PINsNew Banking Attacking Users of Indian banks to Steal Aadhar, PAN, ATM & Credit Card PINs

New Banking Attacking Users of Indian banks to Steal Aadhar, PAN, ATM & Credit Card PINs

A sophisticated malware campaign, dubbed "FatBoyPanel," has been uncovered by cybersecurity researchers, targeting users of Indian banks. This campaign, consisting…

2 months ago
New Attack Method Bypasses EDR with Low Privileged AccessNew Attack Method Bypasses EDR with Low Privileged Access

New Attack Method Bypasses EDR with Low Privileged Access

A new endpoint detection and response (EDR) evasion technique has been identified that allows attackers with low-privilege access to bypass…

2 months ago
ValleyRAT Attacking Org’s Accounting Department with New Delivery TechniquesValleyRAT Attacking Org’s Accounting Department with New Delivery Techniques

ValleyRAT Attacking Org’s Accounting Department with New Delivery Techniques

A concerning uptick in cyberattacks has emerged with ValleyRAT, a Remote Access Trojan (RAT) linked to the Silver Fox advanced…

2 months ago
Hackers Exploit OAuth 2.0 Code Flow Using AiTM Attack on Microsoft Azure ADHackers Exploit OAuth 2.0 Code Flow Using AiTM Attack on Microsoft Azure AD

Hackers Exploit OAuth 2.0 Code Flow Using AiTM Attack on Microsoft Azure AD

Security enthusiasts and professionals are turning their focus towards a new angle on phishing attacks in the identity and access…

2 months ago
KEYPLUG Infrastructure Exposed: Server Configurations and TLS Certificates RevealedKEYPLUG Infrastructure Exposed: Server Configurations and TLS Certificates Revealed

KEYPLUG Infrastructure Exposed: Server Configurations and TLS Certificates Revealed

In a recent technical investigation, researchers uncovered critical insights into the infrastructure linked to a suspected Chinese state-backed cyber actor…

2 months ago
HellCat and Morpheus Ransomware Share Identical Payloads for AttacksHellCat and Morpheus Ransomware Share Identical Payloads for Attacks

HellCat and Morpheus Ransomware Share Identical Payloads for Attacks

The cybersecurity landscape witnessed a surge in ransomware activity during the latter half of 2024 and into early 2025, with…

2 months ago
Critical Vulnerability in Next.js Framework Exposes Websites to Cache Poisoning and XSS AttacksCritical Vulnerability in Next.js Framework Exposes Websites to Cache Poisoning and XSS Attacks

Critical Vulnerability in Next.js Framework Exposes Websites to Cache Poisoning and XSS Attacks

A new report has put the spotlight on potential security vulnerabilities within the popular open-source framework Next.js, demonstrating how improper…

2 months ago
New Cookie Sandwich Technique Allows Stealing of HttpOnly CookiesNew Cookie Sandwich Technique Allows Stealing of HttpOnly Cookies

New Cookie Sandwich Technique Allows Stealing of HttpOnly Cookies

The "Cookie Sandwich Attack" showcases a sophisticated way of exploiting inconsistencies in cookie parsing by web servers. This technique allows…

2 months ago
Murdoc Botnet Exploiting AVTECH Cameras & Huawei Routers to Gain Complete ControlMurdoc Botnet Exploiting AVTECH Cameras & Huawei Routers to Gain Complete Control

Murdoc Botnet Exploiting AVTECH Cameras & Huawei Routers to Gain Complete Control

Researchers have identified an active malware campaign involving a Mirai botnet variant, dubbed Murdoc, which has been targeting AVTECH cameras…

2 months ago
New Supply Chain Attack Targeting Chrome Extensions to Inject Malicious CodeNew Supply Chain Attack Targeting Chrome Extensions to Inject Malicious Code

New Supply Chain Attack Targeting Chrome Extensions to Inject Malicious Code

A sophisticated supply chain attack targeting Chrome browser extensions has come to light, potentially compromising hundreds of thousands of users.…

2 months ago