cybersecurity

Active Raspberry Robin Worm Launch a ‘Hands-on-Keyboard’ Attacks To Hack Entire NetworksActive Raspberry Robin Worm Launch a ‘Hands-on-Keyboard’ Attacks To Hack Entire Networks

Active Raspberry Robin Worm Launch a ‘Hands-on-Keyboard’ Attacks To Hack Entire Networks

During recent research, Microsoft has discovered evidence of a complex interconnected malware ecosystem that is associated with the Raspberry Robin…

3 years ago
Ukrainian Hacker Charged for Operating “Raccoon Stealer” Malware-as-a-ServiceUkrainian Hacker Charged for Operating “Raccoon Stealer” Malware-as-a-Service

Ukrainian Hacker Charged for Operating “Raccoon Stealer” Malware-as-a-Service

In an international cybercrime operation dubbed Raccoon Stealer malware-as-a-service (MaaS), the Department of Justice has charged a Ukrainian 26-year-old, Mark…

3 years ago
Wireshark 4.0.1 Released – What’s New!!Wireshark 4.0.1 Released – What’s New!!

Wireshark 4.0.1 Released – What’s New!!

A new version of Wireshark has been released recently by the Wireshark Team, it's Wireshark 4.0.1, which contains several enhancements,…

3 years ago
Critical RCE Flaw Found in Popular Post-Exploitation Cobalt Strike ToolkitCritical RCE Flaw Found in Popular Post-Exploitation Cobalt Strike Toolkit

Critical RCE Flaw Found in Popular Post-Exploitation Cobalt Strike Toolkit

Recently, a brand-new out-of-band security update (Cobalt Strike 4.7.2) has been released by HelpSystems to fix an RCE vulnerability in…

3 years ago
Fortinet Auth Bypass Bug Exploited in Wild for AttacksFortinet Auth Bypass Bug Exploited in Wild for Attacks

Fortinet Auth Bypass Bug Exploited in Wild for Attacks

A critical vulnerability has been identified recently in FortiGate firewalls and FortiProxy Web Proxy. While FortiGate has already alerted its…

3 years ago
Top Cybersecurity Threats for Public SectorTop Cybersecurity Threats for Public Sector

Top Cybersecurity Threats for Public Sector

In the private sector, hackers and cybercriminals are prone to leaving organizations with good security infrastructures alone. Because they often…

3 years ago
Hackers Using a Custom Malware to Steal Sensitive Data From a U.S. OrganizationHackers Using a Custom Malware to Steal Sensitive Data From a U.S. Organization

Hackers Using a Custom Malware to Steal Sensitive Data From a U.S. Organization

An organization in the DIB sector was compromised by state-funded hackers using a custom malware program, CovalentStealer, and the Impacket…

3 years ago
Chinese APT Hacker Group Using Old Windows Logo to Hide a Backdoor MalwareChinese APT Hacker Group Using Old Windows Logo to Hide a Backdoor Malware

Chinese APT Hacker Group Using Old Windows Logo to Hide a Backdoor Malware

In a recent discovery made by Symantec's security researchers, the Witchetty group has been found to be launching a malicious…

3 years ago
35 Malware Android Apps With over 2 million Installation Found on the Google Play Store35 Malware Android Apps With over 2 million Installation Found on the Google Play Store

35 Malware Android Apps With over 2 million Installation Found on the Google Play Store

It has become increasingly common for threat actors to use Google Play Store to attempt to get malicious applications listed…

3 years ago
Researchers Bypassed Android 13’s New ‘Restricted Setting’ Security FeatureResearchers Bypassed Android 13’s New ‘Restricted Setting’ Security Feature

Researchers Bypassed Android 13’s New ‘Restricted Setting’ Security Feature

Android 13, the new version released by Google last week. The new Android 13 brings in various security upgrades and…

3 years ago