Data Exfiltration

Researchers Details Attacks On Air-Gaps Computers To Steal Data

The air-gap data protection method isolates local networks from the internet to mitigate cyber threats and protect sensitive data, which…

1 month ago

Earth Baku Using Customized Tools To Maintain Persistence And Steal Data

Earth Baku, an APT actor who initially focused on the Indo-Pacific region, has grown its activities extensively since late 2022.…

2 months ago

Hackers Attacking Vaults, Buckets, And Secrets To Steal Data

Hackers target vaults, buckets, and secrets to access some of the most classified and valuable information, including API keys, logins,…

4 months ago

Critical Flaw In Apple Ecosystems Let Attackers Gain Unauthorized Access

Hackers go for Apple due to its massive user base along with rich customers, including business people and managers who…

4 months ago

ALPHV Ransomware Deployment Started With RDP Access And ScreenConnect Installations

Ransomware is used by hackers to abuse victims' data, locking it until a ransom is paid. This method of cyber…

5 months ago

Hackers Abuse QEMU Hardware Emulator for Stealthy C2 Communication

QEMU is an open-source platform that provides a secure and private virtualized space for trying out malicious codes, exploits, and…

8 months ago

Researchers Uncover Tools And Tactics Used By Chinese Hackers

Over the years, several reports associated with cybercriminals have been based in Russia and Western countries. This is due to…

8 months ago