A security researcher who has a long line of work demonstrating novel data exfiltration methods from air-gapped systems has come up with yet another technique […]
Read moreCategory: Cyber Security
Crypto Miners Using Tox P2P Messenger as Command and Control Server
Threat actors have begun to use the Tox peer-to-peer instant messaging service as a command-and-control method, marking a shift from its earlier role as a […]
Read moreResearchers Warn of AiTM Attack Targeting Google G-Suite Enterprise Users
The threat actors behind a large-scale adversary-in-the-middle (AiTM) phishing campaign targeting enterprise users of Microsoft email services have also set their sights on Google Workspace […]
Read moreXCSSET Malware Updates with Python 3 to Target macOS Monterey Users
The operators of the XCSSET macOS malware have upped the stakes by making iterative improvements that add support for macOS Monterey by upgrading its source […]
Read moreGoogle Uncovers Tool Used by Iranian Hackers to Steal Data from Email Accounts
The Iranian government-backed actor known as Charming Kitten has added a new tool to its malware arsenal that allows it to retrieve user data from […]
Read moreNew Air-Gap Attack Uses MEMS Gyroscope Ultrasonic Covert Channel to Leak Data
A novel data exfiltration technique has been found to leverage a covert ultrasonic channel to leak sensitive information from isolated, air-gapped computers to a nearby […]
Read moreCISA Warns of Active Exploitation of Palo Alto Networks’ PAN-OS Vulnerability
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added a security flaw impacting Palo Alto Networks PAN-OS to its Known Exploited Vulnerabilities Catalog, […]
Read moreResearchers Find Counterfeit Phones with Backdoor to Hack WhatsApp Accounts
Budget Android device models that are counterfeit versions associated with popular smartphone brands are harboring multiple trojans designed to target WhatsApp and WhatsApp Business messaging […]
Read moreRTLS Systems Found Vulnerable to MiTM Attacks and Location Tampering
Researchers have disclosed multiple vulnerabilities impacting Ultra-wideband (UWB) Real-time Locating Systems (RTLS), enabling threat actors to launch adversary-in-the-middle (AitM) attacks and tamper with location data. […]
Read moreHackers Using Bumblebee Loader to Compromise Active Directory Services
The malware loader known as Bumblebee is being increasingly co-opted by threat actors associated with BazarLoader, TrickBot, and IcedID in their campaigns to breach target […]
Read moreCISA Adds 7 New Actively Exploited Vulnerabilities to Catalog
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday moved to add a critical SAP security flaw to its Known Exploited Vulnerabilities Catalog, based […]
Read moreBecome a Cybersecurity Expert with 18 New Online Courses @ 98% OFF
With more data stored in the cloud than ever before, now is a good time to get into cybersecurity. Many top corporations are looking for […]
Read moreNew Grandoreiro Banking Malware Campaign Targeting Spanish Manufacturers
Organizations in the Spanish-speaking nations of Mexico and Spain are in the crosshairs of a new campaign designed to deliver the Grandoreiro banking trojan. “In […]
Read moreGoogle Cloud Blocks Record DDoS attack of 46 Million Requests Per Second
Google’s cloud division on Thursday disclosed it mitigated a series of HTTPS distributed denial-of-service (DDoS) attacks which peaked at 46 million requests per second (RPS), […]
Read moreCybercrime Group TA558 Targeting Hospitality, Hotel, and Travel Organizations
A financially motivated cybercrime group has been linked to an ongoing wave of attacks aimed at hospitality, hotel, and travel organizations in Latin America with […]
Read moreDoNot Team Hackers Updated its Malware Toolkit with Improved Capabilities
The Donot Team threat actor has updated its Jaca Windows malware toolkit with improved capabilities, including a revamped stealer module designed to plunder information from […]
Read moreNew Amazon Ring Vulnerability Could Have Exposed All Your Camera Recordings
Retail giant Amazon patched a high-severity security issue in its Ring app for Android in May that could have enabled a rogue application installed on […]
Read moreChina-backed APT41 Hackers Targeted 13 Organisations Worldwide Last Year
The Chinese advanced persistent threat (APT) actor tracked as Winnti (aka APT41) has targeted at least 13 organizations geographically spanning across the U.S, Taiwan, India, […]
Read moreResearchers Detail Evasive DarkTortilla Crypter Used to Deliver Malware
A .NET-based evasive crypter named DarkTortilla has been used by threat actors to distribute a broad array of commodity malware as well as targeted payloads […]
Read moreApple Releases Security Updates to Patch Two New Zero-Day Vulnerabilities
Apple on Wednesday released security updates for iOS, iPadOS, and macOS platforms to remediate two zero-day vulnerabilities previously exploited by threat actors to compromise its […]
Read more