Cybersecurity Threats

Threat Actors Exploit Google Docs And Weebly Services For Malware AttacksThreat Actors Exploit Google Docs And Weebly Services For Malware Attacks

Threat Actors Exploit Google Docs And Weebly Services For Malware Attacks

Phishing attackers used Google Docs to deliver malicious links, bypassing security measures and redirecting victims to fake login pages hosted…

5 months ago
Water Barghest Botnet Comprised 20,000+ IoT Devices By Exploiting VulnerabilitiesWater Barghest Botnet Comprised 20,000+ IoT Devices By Exploiting Vulnerabilities

Water Barghest Botnet Comprised 20,000+ IoT Devices By Exploiting Vulnerabilities

Water Barghest, a sophisticated botnet, exploits vulnerabilities in IoT devices to enlist them in a residential proxy marketplace by leveraging…

5 months ago
Researchers Detailed Credential Abuse CycleResearchers Detailed Credential Abuse Cycle

Researchers Detailed Credential Abuse Cycle

Cybercriminals exploit leaked credentials, obtained through various means, to compromise systems and data, enabling them to gain unauthorized access. This…

5 months ago
Russia, Iran, And China Influence U.S. Elections, Microsoft WarnsRussia, Iran, And China Influence U.S. Elections, Microsoft Warns

Russia, Iran, And China Influence U.S. Elections, Microsoft Warns

The researchers have observed consistent efforts by Russia, Iran, and China to exert foreign influence on democratic processes in the…

6 months ago
Threat Actors Forcing victims Into Entering Login Credentials For StealingThreat Actors Forcing victims Into Entering Login Credentials For Stealing

Threat Actors Forcing victims Into Entering Login Credentials For Stealing

Recent intelligence indicates a new technique employed by stealers to trick victims into entering credentials directly into a browser, enabling…

7 months ago
New Loki Backdoor Attacking macOS SystemsNew Loki Backdoor Attacking macOS Systems

New Loki Backdoor Attacking macOS Systems

Cody Thomas developed Apfell, an open-source macOS post-exploitation framework, in 2018 and evolved into Mythic, a cross-platform framework that addresses…

7 months ago
DISPOSSESSOR And RADAR Ransomware Emerging With RaaS ModelDISPOSSESSOR And RADAR Ransomware Emerging With RaaS Model

DISPOSSESSOR And RADAR Ransomware Emerging With RaaS Model

Ransomware affiliates are forming alliances to recoup losses from unreliable partners. A prominent example involves ALPHV extorting $22 million from…

9 months ago
Rafel RAT Attacking Android Devices To Gain Unauthorized AccessRafel RAT Attacking Android Devices To Gain Unauthorized Access

Rafel RAT Attacking Android Devices To Gain Unauthorized Access

The Rafel RAT is an advanced Android-targeting Remote Access Trojan which poses a great cybersecurity danger. This malicious program has…

10 months ago
New PhaaS Platform Lets Attackers Bypass Two-Factor AuthenticationNew PhaaS Platform Lets Attackers Bypass Two-Factor Authentication

New PhaaS Platform Lets Attackers Bypass Two-Factor Authentication

Several phishing campaign kits have been used widely by threat actors in the past. One popular PhaaS (Phishing-as-a-Platform) was Caffeine,…

10 months ago
Hacktivist Groups Attacking Industrial Control Systems To Disrupt ServicesHacktivist Groups Attacking Industrial Control Systems To Disrupt Services

Hacktivist Groups Attacking Industrial Control Systems To Disrupt Services

Hacktivist groups are increasingly targeting critical infrastructure's Operational Technology (OT) systems, motivated by geopolitical issues that, unlike traditional website defacements,…

11 months ago