Cyber Attack

Hackers Hiding Malware Behind The PNG Images Using Steganography Hackers Hiding Malware Behind The PNG Images Using Steganography 

Hackers Hiding Malware Behind The PNG Images Using Steganography

The Worok threat infects victims' computers with information-stealing malware by concealing malware within PNG images with the help of the…

2 years ago
RomCom RAT Distributed as Spoofed Versions of Popular IP Scanning ToolRomCom RAT Distributed as Spoofed Versions of Popular IP Scanning Tool

RomCom RAT Distributed as Spoofed Versions of Popular IP Scanning Tool

The threat actor behind a remote access trojan, ‘RomCom RAT’ is now targeting Ukrainian military institutions. The threat actors are…

3 years ago
Hackers Actively Exploiting Cisco AnyConnect Secure Flaw to Perform DLL HijackingHackers Actively Exploiting Cisco AnyConnect Secure Flaw to Perform DLL Hijacking

Hackers Actively Exploiting Cisco AnyConnect Secure Flaw to Perform DLL Hijacking

Cisco issued a warning of active exploitation attempts targeting two security vulnerabilities in the Cisco AnyConnect Secure Mobility Client for…

3 years ago
OldGremlin Hacker Group Expanded Toolkit With Dedicated Linux RansomwareOldGremlin Hacker Group Expanded Toolkit With Dedicated Linux Ransomware

OldGremlin Hacker Group Expanded Toolkit With Dedicated Linux Ransomware

It appears that 16 malicious campaigns have been carried out by a Russian-speaking ransomware group called OldGremlin (aka TinyScouts).  A…

3 years ago
Critical RCE Flaw Found in Popular Post-Exploitation Cobalt Strike ToolkitCritical RCE Flaw Found in Popular Post-Exploitation Cobalt Strike Toolkit

Critical RCE Flaw Found in Popular Post-Exploitation Cobalt Strike Toolkit

Recently, a brand-new out-of-band security update (Cobalt Strike 4.7.2) has been released by HelpSystems to fix an RCE vulnerability in…

3 years ago
Black Basta Ransomware Gang Infiltrates Networks Using Penetration Testing ToolsBlack Basta Ransomware Gang Infiltrates Networks Using Penetration Testing Tools

Black Basta Ransomware Gang Infiltrates Networks Using Penetration Testing Tools

The distribution of QAKBOT malware is resurrected once again by operators of the Black Basta ransomware group on September 8,…

3 years ago
Student Jailed for Hacking into Email & Snapchat Accounts of Female ClassmatesStudent Jailed for Hacking into Email & Snapchat Accounts of Female Classmates

Student Jailed for Hacking into Email & Snapchat Accounts of Female Classmates

As part of the criminal case against a former student of the University of Puerto Rico (UPR), a judge in…

3 years ago
RedEye – CISA Developed Open-source Red Team Tool Monitoring C&C Server ActivitiesRedEye – CISA Developed Open-source Red Team Tool Monitoring C&C Server Activities

RedEye – CISA Developed Open-source Red Team Tool Monitoring C&C Server Activities

A new open-source analytical tool dubbed RedEye designed to make it easier for operators to visualize and report activities associated…

3 years ago
Android Device Leaks Traffic When Connected to WiFi Network Even ‘Always-on VPN’ is EnabledAndroid Device Leaks Traffic When Connected to WiFi Network Even ‘Always-on VPN’ is Enabled

Android Device Leaks Traffic When Connected to WiFi Network Even ‘Always-on VPN’ is Enabled

The installation of a VPN on your Android phone is supposed to ensure that all outgoing traffic is protected. This…

3 years ago
Russian Hacker Launch DDoS Attacks Against Major Airports WebsitesRussian Hacker Launch DDoS Attacks Against Major Airports Websites

Russian Hacker Launch DDoS Attacks Against Major Airports Websites

The Distributed Denial of Service (DDoS) attacks, hit 14 major US airport websites. The websites were temporarily shut down due…

3 years ago