Saturday, May 31, 2025

Cyber Attack

Operation DevilTiger, APT Hackers 0-Day Exploitation Tactics Exposed

The APT-Q-12 group, also known as Pseudo Hunter, is a Northeast Asian threat actor linked to Darkhotel, which primarily targets East Asian countries, including...

Attackers Spread Lumma Stealer Malware GitHub Comments

Cybercriminals are leveraging platforms like GitHub to spread the Lumma information stealer malware. This sophisticated threat is part of a growing trend where attackers use...

Pootry EDR Killer Malware Wipes Out Security Tools From Windows Machine

Windows drivers can be abused to bypass security measures. Attackers can exploit vulnerabilities in legitimate drivers or use stolen or forged digital signatures to...

Port of Seattle Hit by Cyberattack, Services & Websites Down

The Port of Seattle and Seattle-Tacoma International Airport (Sea-Tac) were hit by a cyberattack over the weekend. Airport officials confirmed the attack, which shut...

PG_MEM – A Malware Hide in Postgres Processes to Steal Data

Cybersecurity researchers at Aqua Nautilus have uncovered a new malware named PG_MEM that targets PostgreSQL databases. This sophisticated malware employs brute force attacks to gain...

Log4j Vulnerability Exploited Again To Deploy Crypto-Mining Malware

Recent attacks exploit the Log4j vulnerability (Log4Shell) by sending obfuscated LDAP requests to trigger malicious script execution, which establishes persistence, gathers system information, and...

Developers Beware! Fake Job Offers from Legitimate Github Address

A new phishing campaign is targeting developers by exploiting GitHub's legitimate infrastructure. This sophisticated attack involves fake job offers sent from genuine GitHub email...

MegaMedusa, Highly Scalable Web DDoS Attack Tool Used By Hacker Groups

RipperSec, a pro-Palestinian, pro-Muslim Malaysian hacktivist group, has rapidly grown since its Telegram inception in June 2023.  Leveraging a community of over 2,000 members, they...