Cyber Warfare: Hackers have been using CVE-2017-8570 via PPSX to Attack Ukraine
The Ukraine war has been in existence for at least two years now. There were several war weapons being used in the war between Russia and Ukraine which involved cyberattacks, phishing attacks and...
View ArticleDocker Hub Hosted a Massive 3 Million Imageless Repositories for Phishing...
Docker Hub is a platform for hosting docker images that can be used to insert into applications. Additionally, the platform also offers developers with options to develop, collaborate and distribute...
View ArticleDropbox sign Data Breach: API Keys, OAuth Tokens and Passwords Reset
The Dropbox owned Dropbox sign has been identified with a data breach in which a threat actor gained unauthorized access to the production environment of Dropbox sign and accessed sensitive data....
View ArticleTargetCompany Ransomware Group Installs Mallox Ransomware on Vulnerable...
The TargetCompany ransomware group was first discovered in June 2021 that had been using several malware variants such as Tor2Mine,CoinMiner and BlueSky ransomware. Currently, the threat group...
View ArticleHackers Distribute RokRAT LNK Files Pretending as a Certificate
A new campaign of distributing RokRAT malware has been discovered in which threat actors are using different LNK files with legitimate names. The targets of interest were highly South Korean users and...
View ArticleSo, this was the Mastermind Behind the Million Dollars LockBit 3.0
Ever since LockBit’s emergence in 2019, law enforcements and several organizations have been struggling to fight against their ransomware attacks. LockBit acts as a ransomware-as-a-service platform...
View ArticleDell, HSBC and Barclays Data Breach: Millions of Users Data Exposed!
There have been major data breaches in Dell, HSBC and Barclays that could have exposed millions of customer data as well as company data to threat actors. These data have been posted on underground...
View ArticleGoogle’s New Android Theft Protection Features: Protect Your Device Before,...
Smartphones have become a third hand for almost everyone that lets us perform several important tasks including online banking, capturing pictures, scheduling meetings, sending emails, storing...
View ArticleHackers use Malicious OneNote files for Delivering Payloads to Victims
Microsoft OneNote is another application that comes with the Microsoft Office Suite which is used as a digital note-taking application. OneNote can store multiple types of information such as Image,...
View ArticleGomir Backdoor: Kimsuky’s Springtail Attack campaign uses new Linux Backdoor
Kimsuky threat actors have been known to be attributed to Democratic People’s Republic of Korea (DPRK) military intelligence. There have been several large-scale social engineering attacks from North...
View ArticleHackers use New execution technique via ClearFake campaign to install LummaC2
ClearFake is a new JavaScript Framework which typically offers threat actors drive-by downloads on compromised websites. Threat actors can use this framework along with social engineering techniques...
View ArticleRafel RAT : The Android Malware capable of Ransomware Operations
Android malware has been on the rise ever since the boom of digital technologies and social media. There were several types of Android malware observed in the past such as viruses, Trojans,...
View Article“Killer Ultra” Malware: AV/EDR Evasion, Ransomware Operation and Arbitrary...
Qilin ransomware was well known for attacking Synnovis, a London-based provider of pathology services causing a healthcare crisis at London hospitals. The threat group took responsibility for their...
View ArticleHackers Use India Post Lures targets iPhone users in India for Phishing Attack
There have been several phishing campaigns in the past impersonating government entities to gain trust from victims. India Post is India’s government-operated postal system which has a large network...
View ArticleHackers Leverage TryCloudflare Tunnels to Deliver RAT Malware
TryCloudflare is a tool introduced by Cloudflare which allows developers to experiment with Cloudflare Tunnel without adding a site to Cloudflare’s DNS. In other words, a site running on localhost can...
View ArticleFileless Ransomware named “Cronus” targets Users with Fake PayPal Documents
Ransomware attacks have been on the rise since the beginning of 2024 with various ransomware variants used by different threat actors. However, Fileless ransomware is not very common. Given the name...
View Article77th Independence Anniversary Greeted with Multiple Defaced websites by Hackers
With India celebrating their 77th Independence day today, there were many hacktivists groups that have attacked several organizations in India. The cyberattacks against the organizations were...
View ArticleRansom Extortion Campaign attacks 110,000 Domains with Leaked Environment...
Hackers have been found to be targeting cloud environments due to their heavy usage by organizations and the sensitive information that is stored. A recent campaign has been discovered in which the...
View ArticleSoftware Supply Chain Threat Landscape July 2024: PyPI, NPM, GitHub and macOS
Software Supply Chain is an easy and a massive target for threat actors due to the use of open-source software packages in several organizations. In July 2024, there were several supply chain attacks...
View ArticlePavel Durov’s Arrest: What is Happening on/to Telegram? Why was Telegram...
On August 26, 2024, Telegram’s Founder and CEO Pavel Durov was arrested in France. The arrest was made three after he arrived in France. The reason for the arrest was specified as “running a platform...
View Article