GoldDigger Malware Using Deep Fake AI Photos To Hijack Bank Accounts
Hackers use deep fake AI photos to impersonate individuals online, allowing them to deceive, manipulate, or gain unauthorized access to sensitive information or systems. Cybersecurity researchers at...
View ArticleThreat Actors Renting Out Compromised Routers To Other Criminals
APT actors and cybercriminals both exploit proxy anonymization layers and VPN nodes to mask their malicious activities, while Pawn Storm, a well-known APT group, infiltrated a cybercriminal botnet of...
View ArticleHackers Exploit Microsoft Graph API For C&C Communications
An emerging threat leverages Microsoft’s Graph API to facilitate command-and-control (C&C) communications through Microsoft cloud services. Recently, security analysts at Symantec discovered a...
View ArticleHackers Moving To AI But Lacking Behind The Defenders In Adoption Rates
Hackers were actively exploiting the generative AI for cyber attacks; not only that, even threat actors are also exploring new ways to exploit other advanced LLMs like ChatGPT. They could leverage...
View ArticleScattered Spider Attacking Finance & Insurance Industries WorldWide
Hackers very frequently target the finance and insurance sectors due to the large volumes of sensitive data that they own. These areas manage huge quantities of valuable as well as critical financial...
View ArticleHackers Abuse DNS Tunneling For Covert Communication & Firewall Bypass
As a sneaky scheme, hackers use DNS tunneling to bypass traditional security measures. By wrapping malicious data inside DNS queries and responses, they can smuggle out sensitive information or talk...
View ArticleIT Teams Beware! Weaponized WinSCP & PuTTY Delivers Ransomware
Attackers launched a campaign distributing trojanized installers for WinSCP and PuTTY in early March 2024, as clicking malicious ads after searching for the software leads to downloads containing a...
View ArticleCybersecurity Expert Jailed For Hacking 400K Smart Homes, Selling Videos
Hackers target smart homes due to the increased interconnected devices with often insufficient security measures. Smart homes provide a wealth of personal and sensitive information, including access...
View ArticleBeware Of New Social Engineering Attack That Delivers Black Basta Ransomware
Hackers exploit social engineering, which avoids technical security systems, by manipulating the psychology and behavior of a human being. Social engineering techniques, such as baiting emails or...
View ArticleQakBot Malware Exploiting Windows Zero-Day To Gain System Privileges
Hackers exploit the Windows zero-day vulnerabilities, as they offer great advantages. This means that no patches or defenses exist for zero-day vulnerabilities as software vendors are unaware of them,...
View ArticleRussian APT Hackers Attacking Critical Infrastructure
Russia leverages a mix of state-backed Advanced Persistent Threat (APT) groups and financially motivated cybercriminals to achieve its strategic goals, as APT groups conduct espionage to gather...
View ArticleNew Linux Backdoor Attacking Linux Users Via Installation Packages
Linux is widely used in numerous servers, cloud infrastructure, and Internet of Things devices, which makes it an attractive target for gaining unauthorized access or spreading malware. Besides this,...
View ArticleHackers Exploiting Docusign With Phishing Attack To Steal Credentials
Hackers prefer phishing as it exploits human vulnerabilities rather than technical flaws which make it a highly effective and low-cost attack method. Phishing attacks can be easily scaled to target a...
View ArticleSWARM – Switchable Backdoor Attack Against Pre-trained Models
In the big data era, pre-training large vision transformer (ViT) models on massive datasets has become prevalent for enhanced performance on downstream tasks. Visual prompting (VP), introducing...
View ArticleGrandoreiro Malware Hijacks Outlook Client to Send Phishing Emails
X-Force identified a phishing campaign targeting Latin American users since March 2024, where emails impersonate legitimate entities like tax and utility services, urging recipients to click links for...
View ArticleTurla Hackers Leveraging Microsoft Build Engine To Deliver Malware Stealthily
Hackers exploit the Microsoft Build Engine because it can execute code and build applications. This engine provides an easy means for them to send harmful payloads using legitimate software...
View ArticleIkaruz Red Team Leveraging LockBit Builder To Launch Ransomware Attacks
Hackers exploit ransomware as it enables them to extort money from victims by encrypting their data and demanding a ransom for its release. While this method is highly lucrative and often difficult...
View ArticleChinese Hackers Stay Hidden On Military And Government Networks For Six Years
Hackers target military and government networks for varied reasons, primarily related to spying, which involves interference in the functioning of critical infrastructure. This is mainly because...
View ArticleNSA Releases Guidance On Zero Trust Maturity To Secure Application From...
Zero Trust Maturity measures the extent to which an organization has adopted and implemented the Zero Trust security model. It calculates how fully a company has adopted Zero Trust’s foundational...
View ArticleKinsing Malware Attacking Apache Tomcat Server With Vulnerabilities
The scalability and flexibility of cloud platforms recently boosted the emerging trend of cryptomining attacks in the cloud. Unlike on-premises infrastructure, whereby it is difficult to scale up...
View Article