APT
APT37 Hackers Exploit Group Chats to Deliver Malicious LNK Files
In 2024, South Korea witnessed an alarming surge in Advanced Persistent Threat (APT) attacks, with the state-sponsored APT37 group emerging as a significant threat...
cyber security
New ‘SHIELD’ Platform Leverages FPGA and Off-Host Monitoring to Tackle Advanced Ransomware Threats
In a significant advancement against increasingly sophisticated ransomware threats, researchers from NYU Tandon School of Engineering have introduced SHIELD (Secure Host-Independent Extensible Logging), an...
cyber security
Researchers Launch Open-Source UEFI Memory Forensics Framework to Counter Advanced Bootkits
A team of researchers from Ben Gurion University of the Negev has pioneered a novel memory forensics framework for analyzing Unified Extensible Firmware Interface...
Android
Google Blocks 2.28 Million Malicious Apps from Play Store in Security Crackdown
In a continued commitment to enhancing user safety and trust, Google has outlined significant strides made in 2023 to mitigate malicious activities across the...
cyber security
DeepSeek’s Evolving Tactics Amplify the Fraud and Phishing Threat
The rapid growth of Chinese artificial intelligence firm DeepSeek is drawing attention not just for its technological advancements but also for an alarming increase...
cyber security
Arcus Media Ransomware Strikes: Files Locked, Backups Erased, and Remote Access Disabled
The cybersecurity landscape faces increasing challenges as Arcus Media ransomware emerges as a highly sophisticated threat.This Ransomware-as-a-Service (RaaS) operation, first observed in May...
cyber security
Lazarus Group Drop Malicious NPM Packages in Developers Systems Remotely
In a recent discovery by Socket researchers, a malicious npm package named postcss-optimizer has been identified as an operation spearheaded by the North Korean...
cyber security
Cybercriminals Hijack Government Sites to Lauch Phishing Attacks
Cybersecurity researchers have identified a persistent trend in which threat actors exploit vulnerabilities in government websites to further phishing campaigns.Based on data spanning...