Cyber Threats

APT-C-53 Weaponizing LNK Files To Deploy Malware Into Target Systems

Gamaredon, a persistent threat actor since 2013, targets the government, defense, diplomacy, and media sectors of their victims, primarily through…

2 weeks ago

North Korean IT Worker Using Weaponized Video Conference Apps To Attack Job Seakers

North Korean IT workers, operating under the cluster CL-STA-0237, have been implicated in recent phishing attacks leveraging malware-infected video conference…

1 month ago

Hackers Attacking Linux Cloud Servers To Gain Complete Control

Malware storage, distribution, and command and control (C2) operations are increasingly being used to leverage cloud services for recent cybersecurity…

6 months ago

Diamorphine Rootkit Exploiting Linux Systems In The Wild

Threat actors exploit Linux systems because they are prevalent in organizations that host servers, databases, and other important resources.  Exploiting…

6 months ago

Hackers Moving To AI But Lacking Behind The Defenders In Adoption Rates

Hackers were actively exploiting the generative AI for cyber attacks; not only that, even threat actors are also exploring new…

8 months ago

Attackers Leverage Sidecar Container Injection Technique To Stay Stealthy

Kubernetes (K8s) is an open-source container orchestration platform designed to automate application container deployment, scaling, and running.  Containers are isolated…

8 months ago

Responding To And Recovering From Physical Security Breaches

Unfortunately, data breaches and similarly related physical security threats are something of an eventuality in the modern world. Recently published…

1 year ago

10 Cybersecurity Threats in 2024 and How to Protect Yourself

Cybersecurity Threats deal with emerging dangers and include protecting and preventing means against hacker attacks. New technologies are booming, and…

1 year ago

SOC Fourth Defense Phase – Cyber Threat Intelligence Guide

Cyber Threat intelligence is one of the most critical concerns in the evolving threat environment of rapid day-zero attacks, cyber-criminality…

1 year ago

New Sophisticated Android Ransomware that Doesn’t Encrypt Files but Blocks Access to Devices

Microsoft detected new Android ransomware with new attack techniques and behavior that indicates the evolution of mobile ransomware. As we…

4 years ago