Uncategorized

Alert! Windows LPE Zero-day Exploit Advertised on Hacker Forums

A new zero-day Local Privilege Escalation (LPE) exploit has been put up for sale on a notorious hacker forum. This…

8 months ago

AGENT TESLA Malware Steals login Credentials From Chrome & Firefox

Researchers investigated a recent Agent Tesla malware campaign targeting US and Australian organizations, which used phishing emails with fake purchase…

9 months ago

Threat Actors Deliver Malware via YouTube Video Game Cracks

Threat actors target home users with information-stealing malware like Vidar, StealC, and Lumma Stealer, which disguises the malware as pirated…

9 months ago

Microsoft Two-Step Phishing Campaign Attack LinkedIn Users

The professional and personal online spheres are merging as social media platforms like Facebook, LinkedIn, and WhatsApp are now commonly…

9 months ago

AI Package Hallucination – Hackers Abusing ChatGPT, Gemini to Spread Malware

The research investigates the persistence and scale of AI package hallucination, a technique where LLMs recommend non-existent malicious packages.  The…

9 months ago

Ransomware Protection for SaaS Applications: How Backup Strategies Can Mitigate Cyber Risks

Because of today's predominantly digital ecosystem, ransomware attacks pose a significant threat to organizations. These attacks can significantly affect those…

9 months ago

DHCP Hacked to Escalate Privileges in Windows Domains

Security researchers have uncovered a sophisticated method of exploiting the Dynamic Host Configuration Protocol (DHCP) administrators group to escalate privileges…

9 months ago

Beyond the Code: Exploring the Culture of Hacker-Friendly Websites

In the vast expanse of the internet, where digital landscapes are shaped by code and data flows freely, lies a…

10 months ago

225,000+ ChatGPT Credentials Up For Sale on Dark Web Markets

Group-IB has released its latest report, "Hi-Tech Crime Trends 2023/2024," highlighting critical global cyber threats. The report reveals a concerning…

10 months ago

CACTUS Hackers Exploiting Software Bug to Attack Corporate Networks

Threat actors known as CACTUS orchestrated a sophisticated attack on two companies simultaneously, exploiting a software vulnerability within 24 hours…

10 months ago