CVE/vulnerability
Hacktivist Groups Attacking Industrial Control Systems To Disrupt Services
Hacktivist groups are increasingly targeting critical infrastructure's Operational Technology (OT) systems, motivated by geopolitical issues that, unlike traditional website defacements, can disrupt essential services...
Cyber Attack
UNC1151 Hackers Weaponizing Excel Documents To Attack Windows Machine
Mandiant identified a UNC1151 information campaign targeting Ukraine, Lithuania, Latvia, and Poland with disinformation, as CRIL linked a recent malicious XLS campaign to UNC1151. The...
Cyber Attack
Fog Ransomware Attacking Windows Servers Administrators To Steal RDP Logins
A new ransomware variant dubbed ‘Fog’ has been spotted targeting US businesses in the education and recreation sectors.Forensic data revealed that threat actors accessed...
CVE/vulnerability
Threat Actors Weaponize Excel Files To Attack Windows Machines
Attackers are using malicious Excel files with VBA macros to deploy DLLs and ultimately install Cobalt Strike on compromised Windows machines, which use obfuscation...
Cyber Attack
CarnavalHeist Weaponizing Word Documents To Steal Login Credentials
Hackers take advantage of Word documents as weapons due to their widespread use and trust.This is facilitated by the ease with which users...
Cyber Attack
LilacSquid Hackers Attacking IT Industries To Harvest Confidential Data
Hackers target IT industries as they hold valuable data, possess critical infrastructure, and often have access to sensitive information from various sectors. Compromising IT companies...
CVE/vulnerability
CatDDoS Exploiting 80+ Vulnerabilities, Attacking 300+ Targets Daily
Malicious traffic floods targeted systems, servers, or networks in Distributed Denial of Service (DDoS) attacks are actively exploited by hackers. Sometimes, DDoS attacks are used...
Cyber Attack
Hackers Created Rogue VMs in Recent MITRE’s Cyber Attack
State-sponsored hackers recently exploited vulnerabilities in MITRE's Networked Experimentation, Research, and Virtualization Environment (NERVE).They used rogue virtual machines (VMs) to evade detection and maintain...