cyber security
Why and How to Extract Malware Configurations in a Sandbox
Indicators of Compromise (IOCs) are the fuel that powers our cybersecurity defenses and keeps them effective. The most sought-after source of these indicators is...
Cyber Security News
Pawn Storm APT Launch Hash Relay Attacks on Government Departments
In the analysis by Trendmicro, they dissect the recent maneuvers of this advanced persistent threat (APT) actor, shedding light on its unyielding repetition of...
Cyber Security News
APT Hackers Use FalseFont Backdoor to Remotely Hack Computers
Peach Sandstorm APT targets defense contractors globally via the FalseFont Backdoor, which can access remote systems and exfiltrate data.In this campaign, the malware offers the...
Android
Pakistan Hackers Targeting Indian Android Users with Fake Loan Apps
Hackers in India are using fake loan applications to target Android users to take advantage of the rising demand for digital financial services by...
Cyber Security News
SEC X Account was Hacked Using SIM Swapping Method
In a brazen act of digital deception, the U.S. Securities and Exchange Commission's (SEC) official Twitter account, @SECGov, was compromised on January 9th, 2024. This...
Cyber Security News
New SMTP Smuggling Attack Lets Hackers Send Spoofed Emails
SMTP (Simple Mail Transfer Protocol) smuggling is a technique where attackers exploit the inconsistencies in how proxy servers or firewalls analyze and handle the...
Cyber Attack
QakBot Malware Emerges with New Tactics, Attacking Hospitality Industry
QakBot (aka Qbot) primarily targets financial institutions since it is a sophisticated banking trojan and malware.This malware can facilitate more malicious acts, such as...
Cyber Security News
Hackers are Increasingly Using Remote Admin Tools to Control Infected Systems
Recently, there has been a rise in incidences of hackers using "Remote Administration Tools" to control the infected system and bypass protection technologies.Remote administration...