Cyber Attack
Grasshopper Hackers Mimic As Penetration Testing Service To Deploy Malware
Hackers often mimic penetration testing services to disguise their malicious activities as legitimate security assessments. By imitating authorized security testing, attackers can exploit the trust...
Cyber Attack
New Hacker Group Attacking Systems With 10 Malware At Same Time
A malware campaign of huge magnitude, and perhaps run by just one group, is using artificially nested files for distribution named 'WEXTRACT.EXE ...
Cyber Attack
Xeno RAT Attacking Users Via GitHub Repository And .gg Domains
Threat actors use RATs because they provide attackers with persistent access to compromised systems, enabling long-term espionage and exploitation.North Korean hackers and other actors...
Botnet
Hackers Attacking Linux Cloud Servers To Gain Complete Control
Malware storage, distribution, and command and control (C2) operations are increasingly being used to leverage cloud services for recent cybersecurity threats. But, this complicates the...
Cyber Attack
OilRig Hackers Attacking Individuals And Organizations In The Middle East
OilRig is an Iranian-linked cyber espionage group that has been active since 2015, and this group is known for its sophisticated spear-phishing campaigns and...
CVE/vulnerability
New North Korean Actor Distributing Malicious npm Packages To Compromise Organizations
Early in 2024, North Korean threat actors persisted in using the public npm registry to disseminate malicious packages that were similar to those that...
Cross site Scripting
Hackers Use Windows XSS Flaw To Execute Arbitrary Command In MMC Console
Attackers are leveraging a new infection technique called GrimResource that exploits MSC files.By crafting malicious MSC files, they can achieve full code execution...
Cyber Attack
Chinese Winnti Group Intensifies Financially Motivated Attacks
Hackers are increasingly executing financially motivated attacks and all due to the lucrative potential of monetizing the stolen data, ransoms, and fraudulent activities.The digital...