Cyber Attack
Kimusk’s HappyDoor Executed Via regsvr32 File To Evade Detection
Kimsuky, also known as the Velvet Chollima, Black Banshee, THALLIUM, or Emerald Sleet, is a North Korean state-sponsored advanced cyber espionage group that uses...
CVE/vulnerability
Hackers Abused Twilio API To Verify Phone Numbers used For MFA
An unauthenticated endpoint vulnerability allowed threat actors to identify phone numbers associated with Authy accounts, which was identified, and the endpoint has been secured...
Cyber Attack
FakeBat Malware Weaponizing AnyDesk, Zoom, Teams & Chrome
Hackers target and weaponize AnyDesk, Zoom, Teams, and Chrome as these applications are widely used in a multitude of sectors.Not only that, but even...
Cyber Attack
TotalEnergies Cyber Attack: Data of 210,715 Customers Exposed
TotalEnergies Clientes SAU has reported a significant cyberattack that has compromised the personal data of 210,715 customers.The incident has raised serious concerns about data...
Android
Rafel RAT Attacking Android Devices To Gain Unauthorized Access
The Rafel RAT is an advanced Android-targeting Remote Access Trojan which poses a great cybersecurity danger.This malicious program has become popular due to its...
CVE/vulnerability
Hackers Using Polyglot Files In the Wild, Here Comes PolyConv For Detection
Polyglot files have to fit in several file format specifications and respond differently depending on the calling program.This poses a significant risk to endpoint...
Android
CapraRAT Mimics As Popular Android Apps Attacking Android Users
Transparent Tribe (aka APT36) has been active since 2016, focusing on social engineering strategies to target Indian government and military personnel.The CapraTube campaign of...
Cyber Attack
Hackers Using Dropbox And Google Docs To Deliver Orcinius MalwareÂ
A new Orcinius Trojan has been discovered, employing VBA Stomping to hide its infection. The multi-stage trojan uses Dropbox and Google Docs to stay...