cyber security

New BitM Attack Enables Hackers to Hijack User Sessions in SecondsNew BitM Attack Enables Hackers to Hijack User Sessions in Seconds

New BitM Attack Enables Hackers to Hijack User Sessions in Seconds

A recent threat intelligence report highlights the emergence of a sophisticated cyberattack technique known as Browser-in-the-Middle (BitM), which allows hackers…

2 weeks ago
Hackers Exploit Hard Disk Image Files to Deploy VenomRATHackers Exploit Hard Disk Image Files to Deploy VenomRAT

Hackers Exploit Hard Disk Image Files to Deploy VenomRAT

In a recent cybersecurity threat, hackers have been using virtual hard disk image files (.vhd) to distribute the VenomRAT malware,…

2 weeks ago
Bybit Hack: Details of Sophisticated Multi-Stage Attack UncoveredBybit Hack: Details of Sophisticated Multi-Stage Attack Uncovered

Bybit Hack: Details of Sophisticated Multi-Stage Attack Uncovered

The Bybit hack, which occurred on February 21, 2025, has been extensively analyzed by multiple cybersecurity teams, including Sygnia. This…

2 weeks ago
Hackers Use DLL Side-Loading to Deploy Malicious Python CodeHackers Use DLL Side-Loading to Deploy Malicious Python Code

Hackers Use DLL Side-Loading to Deploy Malicious Python Code

A recent discovery by Xavier Mertens, a senior handler at the Internet Storm Center, has highlighted a sophisticated attack where…

2 weeks ago
Squid Werewolf Mimics Recruiters to Target Job Seekers and Steal Personal DataSquid Werewolf Mimics Recruiters to Target Job Seekers and Steal Personal Data

Squid Werewolf Mimics Recruiters to Target Job Seekers and Steal Personal Data

In a sophisticated phishing campaign uncovered by the BI.ZONE Threat Intelligence team, the Squid Werewolf group, also known as APT37,…

2 weeks ago
DocSwap Malware Masquerades as Security Document Viewer to Attack Android Users WorldwideDocSwap Malware Masquerades as Security Document Viewer to Attack Android Users Worldwide

DocSwap Malware Masquerades as Security Document Viewer to Attack Android Users Worldwide

The cybersecurity landscape has witnessed a new threat with the emergence of the DocSwap malware, which disguises itself as a…

2 weeks ago
Microsoft Warns of StilachiRAT Stealing Remote Desktop Protocol Session DataMicrosoft Warns of StilachiRAT Stealing Remote Desktop Protocol Session Data

Microsoft Warns of StilachiRAT Stealing Remote Desktop Protocol Session Data

Microsoft has recently issued a warning about a novel remote access trojan (RAT) known as StilachiRAT, which poses significant threats…

2 weeks ago
Sophisticated Phishing Attack Leverages Microsoft 365 Infrastructure to Target UsersSophisticated Phishing Attack Leverages Microsoft 365 Infrastructure to Target Users

Sophisticated Phishing Attack Leverages Microsoft 365 Infrastructure to Target Users

A highly sophisticated phishing campaign has been uncovered exploiting Microsoft 365's trusted infrastructure to facilitate credential harvesting and account takeover…

2 weeks ago
Crypto Platform OKX Suspends Tool Abused by North Korean HackersCrypto Platform OKX Suspends Tool Abused by North Korean Hackers

Crypto Platform OKX Suspends Tool Abused by North Korean Hackers

Cryptocurrency platform OKX has announced the temporary suspension of its Decentralized Exchange (DEX) aggregator tool. This decision comes on the…

2 weeks ago
Hackers Rapidly Adopt ClickFix Technique for Sophisticated AttacksHackers Rapidly Adopt ClickFix Technique for Sophisticated Attacks

Hackers Rapidly Adopt ClickFix Technique for Sophisticated Attacks

In recent months, a sophisticated social engineering technique known as ClickFix has gained significant traction among cybercriminals and nation-state-sponsored groups.…

3 weeks ago