Cyber Attack
Hackers Toolkit Unveiled, Comprehensive Tools For Various Cyber Attacks
Hackers always keep updating their tools and add new ones to adapt to evolving security measures, bypass defenses, and exploit newly discovered vulnerabilities.
Staying ahead...
CVE/vulnerability
Critical AWS Services Vulnerability Let Attackers Execute Remote Code
Hackers attack AWS as it hosts a vast number of high-value targets, including sensitive data, business applications, and cloud resources for organizations worldwide.
In February...
CVE/vulnerability
Hackers Exploiting WinRAR Flaw To Attacks Windows & Linux(ESXi) Machines
Head Mare, a hacktivist group targeting Russia and Belarus, leverages phishing campaigns distributing WinRAR archives to exploit CVE-2023-38831 for initial access.
By deploying LockBit and...
Cyber Attack
North Korean Kimusky Group Attacking University Professors
Kimsuky, a North Korean APT group, employs targeted phishing campaigns, leveraging DMARC exploitation to conceal social engineering, infiltrate university networks, and steal research for...
Cyber Attack
New APT Actor240524 Weaponizing Official Documents To Deliver Malware
A new APT group, dubbed Actor240524, launched a spear-phishing campaign targeting Azerbaijani and Israeli diplomats on July 1, 2024, where the attackers employed a...
Android
Chameleon Device-Takeover Malware Attacking IT Employees
Researchers have identified a new Chameleon campaign targeting hospitality employees, where the attackers employed a deceptive tactic, disguising malicious software as a CRM app.
File...
Cyber Attack
North Korean Hackers Exploit VPN Update Flaw To Breach Networks
North Korean state-sponsored hacking groups, including Kimsuky (APT43) and Andariel (APT45), have significantly increased cyberattacks on South Korean construction and machinery sectors.
This surge aligns...
Cyber Attack
Panamorfi TCP flood DDoS Attack Targeting Jupyter Notebooks
An attacker, identified as Yawixooo, leveraged a publicly accessible Jupyter Notebook honeypot as an initial access vector.
The honeypot's exposure to the internet-enabled Yawixooo to...