Threat Intelligence

EAGERBEE Malware Updated It’s Arsenal With Payloads & Command ShellsEAGERBEE Malware Updated It’s Arsenal With Payloads & Command Shells

EAGERBEE Malware Updated It’s Arsenal With Payloads & Command Shells

The Kaspersky researchers investigation into the EAGERBEE backdoor revealed its deployment within Middle Eastern ISPs and government entities of novel…

3 months ago
New PLAYFULGHOST Malware Hacking Devices To Remotely Capture Audio RecordingsNew PLAYFULGHOST Malware Hacking Devices To Remotely Capture Audio Recordings

New PLAYFULGHOST Malware Hacking Devices To Remotely Capture Audio Recordings

PLAYFULGHOST, a Gh0st RAT variant, leverages distinct traffic patterns and encryption, which spread via phishing emails and SEO poisoning of…

3 months ago
SMOKEDHAM Backdoor Mimic As Legitimate Tools Leveraging Google Drive & DropboxSMOKEDHAM Backdoor Mimic As Legitimate Tools Leveraging Google Drive & Dropbox

SMOKEDHAM Backdoor Mimic As Legitimate Tools Leveraging Google Drive & Dropbox

UNC2465, a financially motivated threat actor, leverages the SMOKEDHAM backdoor to gain initial access to target networks, which are often…

4 months ago
Hackers Using AV/EDR Bypass Tool From Cybercrime Forums To Bypass EndpointsHackers Using AV/EDR Bypass Tool From Cybercrime Forums To Bypass Endpoints

Hackers Using AV/EDR Bypass Tool From Cybercrime Forums To Bypass Endpoints

Researchers uncovered two previously unknown endpoints with older Cortex XDR agents that used to test an AV/EDR bypass tool were…

5 months ago
Chinese Hackers Attacking Microsoft Customers With Sophisticated Password Spray AttacksChinese Hackers Attacking Microsoft Customers With Sophisticated Password Spray Attacks

Chinese Hackers Attacking Microsoft Customers With Sophisticated Password Spray Attacks

Researchers have identified a network of compromised devices, CovertNetwork-1658, used by Chinese threat actors to launch highly evasive password spray…

5 months ago
A Massive Hacking Toolkit From “You Dun” Threat Group Developed To Lauch Massive Cyber AttackA Massive Hacking Toolkit From “You Dun” Threat Group Developed To Lauch Massive Cyber Attack

A Massive Hacking Toolkit From “You Dun” Threat Group Developed To Lauch Massive Cyber Attack

The "You Dun" hacking group exploited vulnerable Zhiyuan OA software using SQL injection, leveraging tools like WebLogicScan, Vulmap, and Xray…

5 months ago
TWELVE Threat Attacks Windows To Encrypt Then Deleting Victims’ DataTWELVE Threat Attacks Windows To Encrypt Then Deleting Victims’ Data

TWELVE Threat Attacks Windows To Encrypt Then Deleting Victims’ Data

The threat actor, formed in 2023, specializes in ransomware attacks targeting Russian government organizations. It encrypts and deletes victim data,…

6 months ago
Hackers Toolkit Unveiled, Comprehensive Tools For Various Cyber AttacksHackers Toolkit Unveiled, Comprehensive Tools For Various Cyber Attacks

Hackers Toolkit Unveiled, Comprehensive Tools For Various Cyber Attacks

Hackers always keep updating their tools and add new ones to adapt to evolving security measures, bypass defenses, and exploit…

8 months ago
AWS Launches Mithra To Detect Malicious Domains Across SystemsAWS Launches Mithra To Detect Malicious Domains Across Systems

AWS Launches Mithra To Detect Malicious Domains Across Systems

Amazon's e-commerce platforms and cloud services form a digital ecosystem requiring a strong cybersecurity framework. Amazon, which has a vast…

8 months ago
Exodus Underground Market Place Emerging As A Heaven For CybercriminalsExodus Underground Market Place Emerging As A Heaven For Cybercriminals

Exodus Underground Market Place Emerging As A Heaven For Cybercriminals

The Exodus Market, a haven for exiled criminals, has grown to become a significant player in the black market economy.…

8 months ago