Cloud
Hackers Exploit ‘Any/Any’ Communication Configurations in Cloud Services to Host Malware
Recent research by Veriti has uncovered a disturbing trend in cybersecurity: malicious actors are increasingly leveraging cloud infrastructure to distribute malware and operate command-and-control...
Cloud
Microsoft Warns of Silk Typhoon Hackers Exploiting Cloud Services to Attack IT Supply Chain
Microsoft Threat Intelligence has identified a significant shift in tactics by Silk Typhoon, a Chinese espionage group, now targeting common IT solutions such as...
AI
PrintSteal Cybercrime Group Mass-Producing Fake Aadhaar & PAN Cards
A large-scale cybercrime operation dubbed "PrintSteal" has been exposed, revealing a complex network involved in the mass production and distribution of fraudulent Indian KYC...
cyber security
EvilLoader – Unpatched Telegram for Android 0-Day Vulnerability Lets Attackers Install Malware Via Video Files
A new zero-day vulnerability in Telegram for Android, dubbed EvilLoader, has been uncovered by malware analyst 0x6rss.This exploit enables threat actors to disguise...
cyber security
Black Basta’s Notorious Tactics and Techniques Exposed in Leaked Intel
A significant leak of internal chat logs from the Black Basta ransomware group has provided cybersecurity researchers with unprecedented insight into their operations, capabilities,...
cyber security
7 Malicious Go Packages Target Linux & macOS to Deploy Stealthy Malware Loader
Security researchers at Socket have uncovered a sophisticated malware campaign targeting the Go ecosystem.The threat actor has published at least seven malicious packages...
cyber security
Cybercriminals Exploit YouTubers to Spread SilentCryptoMiner on Windows Systems
A sophisticated malware campaign has been uncovered, exploiting the growing popularity of Windows Packet Divert drivers for bypassing internet restrictions.Cybercriminals are distributing the...
cyber security
Case Study: Gaining Internal Network Access Through Physical Penetration Testing
A recent physical penetration test conducted by cybersecurity firm Hackmosphere, revealed critical security flaws in a furniture company's retail store.The test, which simulated...