Sunday, April 6, 2025

Cyber Attack

Hackers Weaponizing Microsoft Access Documents To Execute Malicious Program

In multiple aggressive phishing attempts, the financially motivated organization UAC-0006 heavily targeted Ukraine, utilizing ZIP and RAR attachments to distribute SMOKELOADER malware.The most recent...

Chinese Hackers Stay Hidden On Military And Government Networks For Six Years

Hackers target military and government networks for varied reasons, primarily related to spying, which involves interference in the functioning of critical infrastructure. This is mainly...

DNSBomb : A New DoS Attack That Exploits DNS Queries

A new practical and powerful Denial of service attack has been discovered that exploits DNS queries and responses.This new attack has been termed...

Ikaruz Red Team Leveraging LockBit Builder To Launch Ransomware Attacks

Hackers exploit ransomware as it enables them to extort money from victims by encrypting their data and demanding a ransom for its release. While this...

Turla Hackers Leveraging Microsoft Build Engine To Deliver Malware Stealthily

Hackers exploit the Microsoft Build Engine because it can execute code and build applications. This engine provides an easy means for them to send harmful...

Cloud-Based Malware Attack Abusing Google Drive & Dropbox

A phishing email with a malicious zip attachment initiates the attack. The zip contains a single executable disguised as an Excel file using Left-To-Right...

DoppelGänger Attack: Malware Routed Via News Websites And Social Media

A Russian influence campaign, DoppelGänger, leverages fake news websites (typosquatted and independent) to spread disinformation, undermining support for Ukraine.Structura and SDA are running...

SWARM – Switchable Backdoor Attack Against Pre-trained Models

In the big data era, pre-training large vision transformer (ViT) models on massive datasets has become prevalent for enhanced performance on downstream tasks. Visual prompting...