Cyber Attack
Signal Messenger Exploited in Targeted Attacks on Defense Industry Employees
The Computer Emergency Response Team of Ukraine (CERT-UA) has reported a series of targeted cyberattacks against employees of the defense-industrial complex and members of...
Cyber Attack
US Sperm Donor Giant California Cryobank Hit by Data Breach
California Cryobank, a leading sperm donation facility based in Los Angeles, has been impacted by a significant data breach, potentially affecting both its clients...
APT
MirrorFace Hackers Modify AsyncRAT Execution for Stealthy Deployment in Windows Sandbox
In a significant development, the China-aligned advanced persistent threat (APT) group known as MirrorFace has been observed employing sophisticated tactics to enhance the stealthiness...
Cyber Attack
Sophisticated Cyber Attack Mimics Booking Websites to Unleash LummaStealer Malware
A sophisticated cyberattack has been uncovered, targeting booking websites to spread the LummaStealer malware.This campaign leverages fake CAPTCHA prompts and social engineering techniques...
Cyber Attack
MirrorGuard: Adaptive Defense Mechanism Against Jailbreak Attacks for Secure Deployments
A novel defense strategy, MirrorGuard, has been proposed to enhance the security of large language models (LLMs) against jailbreak attacks.This approach introduces a...
Browser
New BitM Attack Enables Hackers to Hijack User Sessions in Seconds
A recent threat intelligence report highlights the emergence of a sophisticated cyberattack technique known as Browser-in-the-Middle (BitM), which allows hackers to hijack user sessions...
Cyber Attack
Denmark Issues Warning on Major Cyber Attacks Targeting Telecom Sector
Denmark has announced a heightened alert status for the telecommunications sector due to an increased threat from cyber attacks.According to a recent threat assessment...
Cyber Attack
Hackers Rapidly Adopt ClickFix Technique for Sophisticated Attacks
In recent months, a sophisticated social engineering technique known as ClickFix has gained significant traction among cybercriminals and nation-state-sponsored groups.This method exploits human...