CVE/vulnerability
Ransomhub Attacked 210 Victims Since Feb 2024, CISA Released Advisory For Defenders
The FBI, CISA, MS-ISAC, and HHS have released a joint advisory detailing known RansomHub ransomware indicators of compromise (IOCs) and tactics, techniques, and procedures...
Cyber Attack
Researchers Detailed Russian Hacktivist/State Hackers Tactics
The People's Cyber Army of Russia is a Russian hacktivist group known for its strategic use of DDoS attacks and other disruptive tactics.
Operating as...
Cyber Attack
Beware Of New Phishing Attack That Mimics ScreenConnect And Zoom
Zoom is a widely used videotelephony software used for virtual meetings, and its wide audience base attracts the hackers most.
Cyble Research & Intelligence Labs...
Cyber Attack
Operation Oxidovy, Threat Actors Targeting Government And Military Officials
The recent campaign targeting the Czech Republic involves a malicious ZIP file that contains a decoy LNK file and a batch script.
The LNK runs...
Azure
Iranian Hackers Using Multi-Stage Malware To Attack Govt And Defense Sectors Via LinkedIn
Microsoft has identified a new Iranian state-sponsored threat actor, Peach Sandstorm, deploying a custom multi-stage backdoor named Tickler.
This backdoor has been used to target...
Cryptocurrency hack
Critical Atlassian Vulnerability Exploited To Connect Servers In Mining Networks
Hackers usually shift their attention towards Atlassian due to flaws in its software, especially in products like Confluence, which put organizations' private data at...
Cyber Attack
Operation DevilTiger, APT Hackers 0-Day Exploitation Tactics Exposed
The APT-Q-12 group, also known as Pseudo Hunter, is a Northeast Asian threat actor linked to Darkhotel, which primarily targets East Asian countries, including...
Cyber Attack
Attackers Spread Lumma Stealer Malware GitHub Comments
Cybercriminals are leveraging platforms like GitHub to spread the Lumma information stealer malware.
This sophisticated threat is part of a growing trend where attackers use...