Cyber Attack
New PLAYFULGHOST Malware Hacking Devices To Remotely Capture Audio Recordings
PLAYFULGHOST, a Gh0st RAT variant, leverages distinct traffic patterns and encryption, which spread via phishing emails and SEO poisoning of bundled applications, enabling keylogging,...
Cyber Attack
New Stealthy Malware Leveraging SSH Over TOR Attacking Ukrainian Military
Researchers recently discovered a malicious campaign targeting Ukrainian military personnel through fake "Army+" application websites, which host a malicious installer that, upon execution, extracts...
Cyber Attack
Hackers Weaponize Websites With LNK File To Deliver Weaponized LZH File
The watering hole attack leverages a compromised website to deliver malware. When a user visits the infected site, their system downloads an LZH archive...
Cyber Attack
AT&T and Verizon Hacked – Salt Typhoon Compromised The Network For High Profiles
AT&T and Verizon Communications, two of America's largest telecommunications providers, have confirmed they were targeted by the China-linked Salt Typhoon hacking operation, though both...
Cyber Attack
New ‘OtterCookie’ Malware Attacking Software Developers Via Fake Job Offers
Palo Alto Networks reported the Contagious Interview campaign in November 2023, a financially motivated attack targeting various organizations, unlike typical nation-sponsored attacks. While primarily associated...
Cyber Attack
USA Launched Cyber Attack on Chinese Technology Firms
The Chinese National Internet Emergency Center (CNIE) has revealed two significant cases of cyber espionage targeting Chinese technology companies and research institutions.These attacks,...
Cyber Attack
Skuld Malware Using Weaponized Windows Utilities Packages To Deliver Malware
Researchers discovered a malware campaign targeting the npm ecosystem, distributing the Skuld info stealer through malicious packages disguised as legitimate tools. The threat actor,...
Cyber Attack
Lazarus Hackers Using New VNC Based Malware To Attack Organizations Worldwide
The Lazarus Group has recently employed a sophisticated attack, dubbed "Operation DreamJob," to target employees in critical sectors like nuclear energy, which involves distributing...