Cyber Attack
Chinese Hackers Using Shared Framework To Create Multi-Platform Malware
Shared frameworks are often prone to hackers' abuses as they have been built into various applications, which offer a range of systems that can...
Cyber Attack
Hackers Registered 500k+ Domains Using Algorithms For Extensive Cyber Attack
Hackers often register new domains for phishing attacks, spreading malware, and other deceitful activities. Such domains are capable of pretending to be trusted entities, which...
Cyber Attack
Beware Of Fake Browser Updates That Installs Malicious BOINC Infrastructre
SocGholish malware, also known as FakeUpdates, has exhibited new behavior since July 4th, 2024, as the infection chain still begins with a compromised website...
Cyber Attack
Octo Tempest Know for Attacking VMWare ESXi Servers Added RansomHub & Qilin to Its Arsenal
Threat actors often attack VMware ESXi servers since they accommodate many virtual machines, which link to a variety of systems via one breach. Compromising an...
Cyber Attack
TAG-100 Actors Using Open-Source Tools To Attack Gov & Private Orgs
Hackers exploit open-source tools to execute attacks because they are readily available, well-documented, and often have extensive community support, making them easy to modify...
Cyber Attack
macOS Users Beware Of Weaponized Meeting App From North Korean Hackers
Meeting apps are often targeted and turned into weapons by hackers as they are largely employed for communication and collaboration, frequently carrying sensitive data...
Cyber Attack
Hackers Exploiting Legitimate RMM Tools With BugSleep Malware
Since October 2023, MuddyWater, which is an Iranian threat group linked to MOIS, has escalated its phishing campaigns in Middle East countries, specifically Israel.In...
Cyber Attack
Volcano Demon Group Attacking Organizations With LukaLocker Ransomware
The Volcano Demon group has been discovered spreading a new ransomware called LukaLocker, which targets Idealease Inc., a truck leasing company.The malware targets several...