THREATS

Threat Actors Use “Atlantis AIO” Tool to Automate Credential Stuffing Attacks

In a concerning development for cybersecurity professionals, threat actors are increasingly utilizing a powerful tool called Atlantis AIO to automate…

2 weeks ago

Raspberry Robin Unveils 200 Unique Domains Used by Threat Actors

In a significant development, cybersecurity firm Silent Push has identified nearly 200 unique command and control (C2) domains associated with…

2 weeks ago

Banking Malware Infects 248,000 Mobile Users Through Social Engineering Techniques

In 2024, the number of users affected by mobile banking malware skyrocketed to nearly 248,000, a staggering 3.6-fold increase from…

2 weeks ago

CleanStack: Dual-Stack Solution to Defend Against Memory Corruption Attacks

CleanStack is a novel stack protection mechanism designed to combat memory corruption attacks, which have long been a significant threat…

2 weeks ago

Chinese ‘Web Shell Whisperer’ Leverages Shells and Tunnels to Establish Stealthy Persistence

A recent cyber espionage operation by a China-nexus threat actor, dubbed "Weaver Ant," has been uncovered by Sygnia, a cybersecurity…

2 weeks ago

Researchers Uncover FIN7’s Stealthy Python-Based Anubis Backdoor

Researchers have recently discovered a sophisticated Python-based backdoor, known as the Anubis Backdoor, deployed by the notorious cybercrime group FIN7.…

2 weeks ago

Threat Actors Leverage Reddit to Spread AMOS and Lumma Stealers

In a recent surge of cyber threats, threat actors have been exploiting Reddit to distribute two potent malware variants: AMOS…

2 weeks ago

New Steganographic Malware Hides in JPEG Files to Spread Infostealers

A recent cybersecurity threat has been identified, where steganographic malware is being distributed through seemingly innocuous JPEG image files. This…

2 weeks ago

RansomHub Affiliate Deploys New Custom Backdoor “Betruger” for Persistent Access

Symantec's Threat Hunter team has identified a sophisticated custom backdoor named "Betruger" linked to a RansomHub affiliate. This newly discovered…

2 weeks ago

Threat Actors Leverage Legacy Drivers to Circumvent TLS Certificate Validation

Threat actors have recently been exploiting legacy drivers to bypass certificate validation, leveraging a technique known as "Legacy Driver Exploitation."…

3 weeks ago