Monday, January 13, 2025

Cyber Attack

Heavily Obfuscated PIKABOT Evades EDR Protection

PIKABOT is a polymorphic malware that constantly modifies its code, making it hard to recognize and easily bypasses the Endpoint Detection and Response (EDR)...

Scattered Spider: Advanced Techniques for Launching High-Profile Attacks

Scattered Spider is a threat group responsible for attacking several organizations since May 2022 by using techniques like social engineering, ransomware, extortion, SIM Swapping...

How to Analyse Linux Malware in ANY.RUN

Linux, traditionally viewed as a more secure operating system than Windows, has experienced a notable increase in malware attacks. In 2022, Linux malware incidents...

New Mingo Malware Attacking Linux Redis Servers To Mine Cryptocurrency

The malware, termed Migo by the creators, attempts to infiltrate Redis servers to mine cryptocurrency on the Linux host.The campaign employed many Redis system-weakening commands to potentially...

Alpha Ransomware Uses Living-Off-The-Land Tools To Attack Windows Computers

Ransomware utilizes living-off-the-land tools in Windows attacks for stealth and evasion. They can blend in with normal system activities by leveraging legitimate, built-in tools...

Akira Ransomware Actively Exploiting Cisco Anyconnect Vulnerability

Threat actors exploit Cisco AnyConnect vulnerabilities to gain unauthorized access to networks, compromise sensitive information, and potentially execute malicious activities. Exploiting these vulnerabilities allows attackers...

Turla APT’c New Tool Designed to Steal Login Credentials

The Russian cyber espionage threat group "Turla APT group" was discovered to be using a new backdoor for its malicious operations.This new backdoor...

How to Analyze the MITRE Engenuity ATT&CK® Evaluations: Enterprise

Thorough, independent tests are vital as cybersecurity leaders and their teams evaluate vendors’ abilities to guard against increasingly sophisticated threats to their organizations. And...