Uncategorized

Alert! Windows LPE Zero-day Exploit Advertised on Hacker ForumsAlert! Windows LPE Zero-day Exploit Advertised on Hacker Forums

Alert! Windows LPE Zero-day Exploit Advertised on Hacker Forums

A new zero-day Local Privilege Escalation (LPE) exploit has been put up for sale on a notorious hacker forum. This…

12 months ago
AGENT TESLA Malware Steals login Credentials From Chrome & FirefoxAGENT TESLA Malware Steals login Credentials From Chrome & Firefox

AGENT TESLA Malware Steals login Credentials From Chrome & Firefox

Researchers investigated a recent Agent Tesla malware campaign targeting US and Australian organizations, which used phishing emails with fake purchase…

12 months ago
Threat Actors Deliver Malware via YouTube Video Game CracksThreat Actors Deliver Malware via YouTube Video Game Cracks

Threat Actors Deliver Malware via YouTube Video Game Cracks

Threat actors target home users with information-stealing malware like Vidar, StealC, and Lumma Stealer, which disguises the malware as pirated…

12 months ago
Microsoft Two-Step Phishing Campaign Attack LinkedIn UsersMicrosoft Two-Step Phishing Campaign Attack LinkedIn Users

Microsoft Two-Step Phishing Campaign Attack LinkedIn Users

The professional and personal online spheres are merging as social media platforms like Facebook, LinkedIn, and WhatsApp are now commonly…

12 months ago
AI Package Hallucination – Hackers Abusing ChatGPT, Gemini to Spread MalwareAI Package Hallucination – Hackers Abusing ChatGPT, Gemini to Spread Malware

AI Package Hallucination – Hackers Abusing ChatGPT, Gemini to Spread Malware

The research investigates the persistence and scale of AI package hallucination, a technique where LLMs recommend non-existent malicious packages.  The…

12 months ago
Ransomware Protection for SaaS Applications: How Backup Strategies Can Mitigate Cyber RisksRansomware Protection for SaaS Applications: How Backup Strategies Can Mitigate Cyber Risks

Ransomware Protection for SaaS Applications: How Backup Strategies Can Mitigate Cyber Risks

Because of today's predominantly digital ecosystem, ransomware attacks pose a significant threat to organizations. These attacks can significantly affect those…

12 months ago
DHCP Hacked to Escalate Privileges in Windows DomainsDHCP Hacked to Escalate Privileges in Windows Domains

DHCP Hacked to Escalate Privileges in Windows Domains

Security researchers have uncovered a sophisticated method of exploiting the Dynamic Host Configuration Protocol (DHCP) administrators group to escalate privileges…

1 year ago
Beyond the Code: Exploring the Culture of Hacker-Friendly WebsitesBeyond the Code: Exploring the Culture of Hacker-Friendly Websites

Beyond the Code: Exploring the Culture of Hacker-Friendly Websites

In the vast expanse of the internet, where digital landscapes are shaped by code and data flows freely, lies a…

1 year ago
225,000+ ChatGPT Credentials Up For Sale on Dark Web Markets225,000+ ChatGPT Credentials Up For Sale on Dark Web Markets

225,000+ ChatGPT Credentials Up For Sale on Dark Web Markets

Group-IB has released its latest report, "Hi-Tech Crime Trends 2023/2024," highlighting critical global cyber threats. The report reveals a concerning…

1 year ago
CACTUS Hackers Exploiting Software Bug to Attack Corporate NetworksCACTUS Hackers Exploiting Software Bug to Attack Corporate Networks

CACTUS Hackers Exploiting Software Bug to Attack Corporate Networks

Threat actors known as CACTUS orchestrated a sophisticated attack on two companies simultaneously, exploiting a software vulnerability within 24 hours…

1 year ago