Sunday, May 19, 2024

Hackers Abusing LSASS Process Memory to Exfiltrate Login Credentials

Threat actors have been using several methods for credential stealing, which varies based on the environment and infrastructure of the system.Most of the...

Sidewinder Hacker Group Using Weaponized Documents to Deliver Malware

Sidewinder APT group's sophisticated threat landscape reveals a skilled and persistent threat targeting the Nepalese Government entities. Their focus extends to South Asian governments, with...

Tech Device Manufacturers Urged by CISA to Remove Default Passwords

Recently, the Cybersecurity and Infrastructure Security Agency (CISA) has requested technology device manufacturers to take measures to eliminate default passwords due to the threats...

Over 50% of the Insider Attacks Uses Privilege Escalation Vulnerability

In the labyrinth of cybersecurity, the specter of insider threats emerges as a formidable adversary, wielding both malicious intent and unintentional foibles. This expose delves...

North Korean Hackers Posed as Job Recruiters and Seekers

Two ongoing efforts, Contagious Interview and Wagemole, have been identified to target job-seeking activities connected to North Korean Hackers and state-sponsored threat actors.Threat actors...

Managed WAF protection


Recent Articles