THREATS

Threat Actor ProKYC Selling Tools To Bypass Two-Factor AuthenticationThreat Actor ProKYC Selling Tools To Bypass Two-Factor Authentication

Threat Actor ProKYC Selling Tools To Bypass Two-Factor Authentication

Threat actors are leveraging a newly discovered deepfake tool, ProKYC, to bypass two-factor authentication on cryptocurrency exchanges, which is designed…

4 months ago
DCRAt Attacking Users Via HTML Smuggling To Steal Login CredentialsDCRAt Attacking Users Via HTML Smuggling To Steal Login Credentials

DCRAt Attacking Users Via HTML Smuggling To Steal Login Credentials

In a new campaign that is aimed at users who speak Russian, the modular remote access tool (RAT) known as…

5 months ago
Creating An AI Honeypot To Engage With Attackers SophisticatedlyCreating An AI Honeypot To Engage With Attackers Sophisticatedly

Creating An AI Honeypot To Engage With Attackers Sophisticatedly

Honeypots, decoy systems, detect and analyze malicious activity by coming in various forms and can be deployed on cloud platforms…

5 months ago
Crimson Palace Returns With New Hacking Tolls And TacticsCrimson Palace Returns With New Hacking Tolls And Tactics

Crimson Palace Returns With New Hacking Tolls And Tactics

Cluster Bravo, despite its brief initial activity, subsequently targeted 11 organizations in the same region, as researchers found that these…

5 months ago
Threat Actors Using New Malware Toolkit That Involves IIS Backdoor, DNS TunnelingThreat Actors Using New Malware Toolkit That Involves IIS Backdoor, DNS Tunneling

Threat Actors Using New Malware Toolkit That Involves IIS Backdoor, DNS Tunneling

The Iranian threat actor APT34, also known as GreenBug, has recently launched a new campaign targeting Iraqi government entities by…

5 months ago
Chinese Hackers Using Open Source Tools To Launch Cyber AttacksChinese Hackers Using Open Source Tools To Launch Cyber Attacks

Chinese Hackers Using Open Source Tools To Launch Cyber Attacks

Three Chinese state-backed threat groups, APT10, GALLIUM, and Stately Taurus, have repeatedly employed a modified version of the open-source network…

5 months ago
Growth of Web3 Fuled New Opportunities for Threat Actors to Attack Finance SectorsGrowth of Web3 Fuled New Opportunities for Threat Actors to Attack Finance Sectors

Growth of Web3 Fuled New Opportunities for Threat Actors to Attack Finance Sectors

Web3 and DeFi have been appealing to many threat actors, and there has been a significant boost in heists that…

6 months ago
Operation Oxidovy, Threat Actors Targeting Government And Military OfficialsOperation Oxidovy, Threat Actors Targeting Government And Military Officials

Operation Oxidovy, Threat Actors Targeting Government And Military Officials

The recent campaign targeting the Czech Republic involves a malicious ZIP file that contains a decoy LNK file and a…

6 months ago
AWS Launches Mithra To Detect Malicious Domains Across SystemsAWS Launches Mithra To Detect Malicious Domains Across Systems

AWS Launches Mithra To Detect Malicious Domains Across Systems

Amazon's e-commerce platforms and cloud services form a digital ecosystem requiring a strong cybersecurity framework. Amazon, which has a vast…

7 months ago
Exodus Underground Market Place Emerging As A Heaven For CybercriminalsExodus Underground Market Place Emerging As A Heaven For Cybercriminals

Exodus Underground Market Place Emerging As A Heaven For Cybercriminals

The Exodus Market, a haven for exiled criminals, has grown to become a significant player in the black market economy.…

7 months ago