Tuesday, April 8, 2025

Hacks

Why and How to Extract Malware Configurations in a Sandbox

Indicators of Compromise (IOCs) are the fuel that powers our cybersecurity defenses and keeps them effective. The most sought-after source of these indicators is...

Pawn Storm APT Launch Hash Relay Attacks on Government Departments

In the analysis by Trendmicro, they dissect the recent maneuvers of this advanced persistent threat (APT) actor, shedding light on its unyielding repetition of...

APT Hackers Use FalseFont Backdoor to Remotely Hack Computers

Peach Sandstorm APT targets defense contractors globally via the FalseFont Backdoor, which can access remote systems and exfiltrate data.In this campaign, the malware offers the...

Pakistan Hackers Targeting Indian Android Users with Fake Loan Apps

Hackers in India are using fake loan applications to target Android users to take advantage of the rising demand for digital financial services by...

SEC X Account was Hacked Using SIM Swapping Method

In a brazen act of digital deception, the U.S. Securities and Exchange Commission's (SEC) official Twitter account, @SECGov, was compromised on January 9th, 2024. This...

New SMTP Smuggling Attack Lets Hackers Send Spoofed Emails

SMTP (Simple Mail Transfer Protocol) smuggling is a technique where attackers exploit the inconsistencies in how proxy servers or firewalls analyze and handle the...

QakBot Malware Emerges with New Tactics, Attacking Hospitality Industry

QakBot (aka Qbot) primarily targets financial institutions since it is a sophisticated banking trojan and malware.This malware can facilitate more malicious acts, such as...

Hackers are Increasingly Using Remote Admin Tools to Control Infected Systems

Recently, there has been a rise in incidences of hackers using "Remote Administration Tools" to control the infected system and bypass protection technologies.Remote administration...