Cyber Attack

Hackers Deploy Web Shell To Abuse IIS Worker And Exfiltrate DataHackers Deploy Web Shell To Abuse IIS Worker And Exfiltrate Data

Hackers Deploy Web Shell To Abuse IIS Worker And Exfiltrate Data

An attacker exploited a vulnerability in the batchupload.aspx and email_settings.aspx pages on the target server that allowed them to upload…

3 months ago
5,000 WordPress Sites Hacked in New WP3.XYZ Malware Attack5,000 WordPress Sites Hacked in New WP3.XYZ Malware Attack

5,000 WordPress Sites Hacked in New WP3.XYZ Malware Attack

Widespread malware campaigns detected by side crawlers exploit vulnerabilities on multiple websites where the intrusion method remains under investigation, with…

3 months ago
QSC: Multi-Plugin Malware Framework Installs Backdoor on WindowsQSC: Multi-Plugin Malware Framework Installs Backdoor on Windows

QSC: Multi-Plugin Malware Framework Installs Backdoor on Windows

The QSC Loader service DLL named "loader.dll" leverages two distinct methods to obtain the path to the Core module code.…

3 months ago
Weaponized LDAP Exploit Deploys Information-Stealing MalwareWeaponized LDAP Exploit Deploys Information-Stealing Malware

Weaponized LDAP Exploit Deploys Information-Stealing Malware

Cybercriminals are exploiting the recent critical LDAP vulnerabilities (CVE-2024-49112 and CVE-2024-49113) by distributing fake proof-of-concept exploits for CVE-2024-49113 (dubbed "LDAPNightmare"). …

3 months ago
Researchers Reveal Exploitation Techniques of North Korean Kimsuky APT GroupResearchers Reveal Exploitation Techniques of North Korean Kimsuky APT Group

Researchers Reveal Exploitation Techniques of North Korean Kimsuky APT Group

Since 2013, the advanced persistent threat (APT) known as Kimsuky, which the North Korean government sponsors, has been actively conducting…

3 months ago
Mirai Botnet Variant Exploits Zero-Day Vulnerabilities in RoutersMirai Botnet Variant Exploits Zero-Day Vulnerabilities in Routers

Mirai Botnet Variant Exploits Zero-Day Vulnerabilities in Routers

Researchers observed the Gayfemboy botnet in early 2024 as a basic Mirai variant. Still, the botnet rapidly evolved through iterative…

3 months ago
Gravy Analytics Hit by Cyberattack, Hackers Allegedly Stole dataGravy Analytics Hit by Cyberattack, Hackers Allegedly Stole data

Gravy Analytics Hit by Cyberattack, Hackers Allegedly Stole data

Gravy Analytics, a prominent player in location intelligence, has reportedly fallen victim to a significant cyberattack. Initial investigations suggest that…

3 months ago
How Nation-State Actors and Organised Hackers Involving in Their Ways of Cyber AttacksHow Nation-State Actors and Organised Hackers Involving in Their Ways of Cyber Attacks

How Nation-State Actors and Organised Hackers Involving in Their Ways of Cyber Attacks

The distinction between nation-state actors and organized cybercriminals is becoming increasingly blurred. Both groups now leverage similar tactics, techniques, and…

3 months ago
Malicious npm Packages Stealing Developers’ Sensitive DataMalicious npm Packages Stealing Developers’ Sensitive Data

Malicious npm Packages Stealing Developers’ Sensitive Data

Attackers published 20 malicious npm packages impersonating legitimate Nomic Foundation and Hardhat plugins, where these packages, downloaded over 1,000 times,…

3 months ago
New PLAYFULGHOST Malware Hacking Devices To Remotely Capture Audio RecordingsNew PLAYFULGHOST Malware Hacking Devices To Remotely Capture Audio Recordings

New PLAYFULGHOST Malware Hacking Devices To Remotely Capture Audio Recordings

PLAYFULGHOST, a Gh0st RAT variant, leverages distinct traffic patterns and encryption, which spread via phishing emails and SEO poisoning of…

3 months ago