Cyber Attack
TAG-100 Actors Using Open-Source Tools To Attack Gov & Private Orgs
Hackers exploit open-source tools to execute attacks because they are readily available, well-documented, and often have extensive community support, making them easy to modify...
Cyber Attack
macOS Users Beware Of Weaponized Meeting App From North Korean Hackers
Meeting apps are often targeted and turned into weapons by hackers as they are largely employed for communication and collaboration, frequently carrying sensitive data...
Cyber Attack
Hackers Exploiting Legitimate RMM Tools With BugSleep Malware
Since October 2023, MuddyWater, which is an Iranian threat group linked to MOIS, has escalated its phishing campaigns in Middle East countries, specifically Israel.In...
Cyber Attack
Volcano Demon Group Attacking Organizations With LukaLocker Ransomware
The Volcano Demon group has been discovered spreading a new ransomware called LukaLocker, which targets Idealease Inc., a truck leasing company.The malware targets several...
CVE/vulnerability
MirrorFace Attacking Organizations Exploiting Vulnerabilities In Internet-Facing Assets
MirrorFace threat actors have been targeting media, political organizations, and academic institutions since 2022, shifting focus to manufacturers and research institutions in 2023. The attack...
Cyber Attack
New Poco RAT Weaponizing 7zip Files Using Google Drive
The hackers weaponize 7zip files to pass through security measures and deliver malware effectively.These archived files can hide malicious content, which makes it more...
Cryptocurrency hack
ViperSoftX Weaponizing AutoIt & CLR For Stealthy PowerShell Execution
ViperSoftX is an advanced malware that has become more complicated since its recognition in 2020, to the extent that eBooks are used on Torrent...
CVE/vulnerability
Malicious NuGet Campaign Tricking Developers To Inject Malicious Code
Hackers often target NuGet as it's a popular package manager for .NET, which developers widely use to share and consume reusable code. Threat actors can...