cryptocurrency
Lazarus APT Laundered Over $900 Million Worth of Cryptocurrency
Threat actors have been laundering currencies with multiple methods. One of the most predominant ways they have been using lately was the Cross-chain crime....
Cyber Security News
Qakbot Threat Actors Deliver Knight Ransomware & Remcos Via LNK Files
Qakbot's infrastructure and cryptocurrency assets were seized by government authorities in an operation in August 2023 with the assistance of international allies, raising concerns...
Cyber Attack
Hackers Hijacking Microsoft SQL Servers to Compromise Azure Environments
Hackers frequently target Microsoft SQL servers because of their extensive use and possible weaknesses. These servers are a top target for hackers looking to make...
Cyber Attack
Massive Surge in Cyber Attacks Targeting Real Estate and Utilities Organizations
Cyber attacks are becoming increasingly sophisticated as threat actors continuously evolve their tools and tactics. They leverage advanced technologies, use social engineering techniques, and collaborate...
AWS
MadPot: AWS Honeypot to Disrupt Threat Actors
In the realm of cybersecurity, the battle against threat actors never stops. With its vast cloud infrastructure, Amazon Web Services (AWS) is at the...
Cyber Security News
North Korean and Chinese Hackers Attacking Healthcare Industries
Healthcare has been one of the primary industries targeted by threat actors as part of every malware or ransomware campaign. Many Advanced Persistent Threat...
Cyber Security News
Threat Actors Actively Using Remote Management Tools to Deploy Ransomware
The threat actors have been spotted increasingly depending on Remote Management and Monitoring (RMM) tools, which resulted in a relatively botched Hive ransomware distribution. The original payload...
Cyber Security News
Fortinet FortiOS Flaw Let Attacker Execute Malicious JavaScript Code
Fortinet FortiOS has been discovered with Cross-Site Scripting (XSS) and Cross-Site Request Forgery (CSRF) vulnerabilities, which threat actors can use for malicious purposes.These vulnerabilities...