THREATS

This section has all the newest information on a wide range of threats, such as online threats, physical security risks, and new threats. Keep up with the latest changes in attacks, weaknesses, and possible dangers in a variety of areas. Our coverage gives you an idea of how these threats are changing and what you can do to lessen their effects.

Gamaredon Hackers Weaponize LNK Files to Deliver Remcos BackdoorGamaredon Hackers Weaponize LNK Files to Deliver Remcos Backdoor

Gamaredon Hackers Weaponize LNK Files to Deliver Remcos Backdoor

Cisco Talos has uncovered an ongoing cyber campaign by the Gamaredon threat actor group, targeting Ukrainian users with malicious LNK…

2 days ago
Russian Hackers Impersonate CIA to Steal Ukrainian Defense Intelligence DataRussian Hackers Impersonate CIA to Steal Ukrainian Defense Intelligence Data

Russian Hackers Impersonate CIA to Steal Ukrainian Defense Intelligence Data

In a complex cyber operation discovered by Silent Push Threat Analysts, Russian hackers have launched a multi-pronged phishing campaign impersonating…

3 days ago
Threat Actors Compromise 150,000 Websites to Promote Chinese Gambling PlatformsThreat Actors Compromise 150,000 Websites to Promote Chinese Gambling Platforms

Threat Actors Compromise 150,000 Websites to Promote Chinese Gambling Platforms

A large-scale cyberattack has compromised approximately 150,000 legitimate websites by injecting malicious JavaScript to redirect visitors to Chinese-language gambling platforms.…

4 days ago
Threat Actors Use Fake Booking.com Emails to Deceive Hotel Staff and Gain System AccessThreat Actors Use Fake Booking.com Emails to Deceive Hotel Staff and Gain System Access

Threat Actors Use Fake Booking.com Emails to Deceive Hotel Staff and Gain System Access

A sophisticated phishing campaign targeting the hospitality industry has been uncovered, with threat actors impersonating Booking.com to gain access to…

4 days ago
Lucid PhAAS Platform Uses RCS and iMessage to Evade DetectionLucid PhAAS Platform Uses RCS and iMessage to Evade Detection

Lucid PhAAS Platform Uses RCS and iMessage to Evade Detection

The cybersecurity landscape has been disrupted by the emergence of Lucid, a sophisticated Phishing-as-a-Service (PhAAS) platform developed by Chinese-speaking threat…

4 days ago
Threat Actors Use “Atlantis AIO” Tool to Automate Credential Stuffing AttacksThreat Actors Use “Atlantis AIO” Tool to Automate Credential Stuffing Attacks

Threat Actors Use “Atlantis AIO” Tool to Automate Credential Stuffing Attacks

In a concerning development for cybersecurity professionals, threat actors are increasingly utilizing a powerful tool called Atlantis AIO to automate…

5 days ago
Raspberry Robin Unveils 200 Unique Domains Used by Threat ActorsRaspberry Robin Unveils 200 Unique Domains Used by Threat Actors

Raspberry Robin Unveils 200 Unique Domains Used by Threat Actors

In a significant development, cybersecurity firm Silent Push has identified nearly 200 unique command and control (C2) domains associated with…

5 days ago
Banking Malware Infects 248,000 Mobile Users Through Social Engineering TechniquesBanking Malware Infects 248,000 Mobile Users Through Social Engineering Techniques

Banking Malware Infects 248,000 Mobile Users Through Social Engineering Techniques

In 2024, the number of users affected by mobile banking malware skyrocketed to nearly 248,000, a staggering 3.6-fold increase from…

6 days ago
CleanStack: Dual-Stack Solution to Defend Against Memory Corruption AttacksCleanStack: Dual-Stack Solution to Defend Against Memory Corruption Attacks

CleanStack: Dual-Stack Solution to Defend Against Memory Corruption Attacks

CleanStack is a novel stack protection mechanism designed to combat memory corruption attacks, which have long been a significant threat…

7 days ago
Chinese ‘Web Shell Whisperer’ Leverages Shells and Tunnels to Establish Stealthy PersistenceChinese ‘Web Shell Whisperer’ Leverages Shells and Tunnels to Establish Stealthy Persistence

Chinese ‘Web Shell Whisperer’ Leverages Shells and Tunnels to Establish Stealthy Persistence

A recent cyber espionage operation by a China-nexus threat actor, dubbed "Weaver Ant," has been uncovered by Sygnia, a cybersecurity…

7 days ago