Posts

Researchers Uncover Darknet Service Allowing Hackers to Trojonize Legit Android Apps

Image
Researchers have shed light on a new hybrid malware campaign targeting both Android and Windows operating systems in a bid to expand its pool of victims. read more 

Russian Hackers Spotted Targeting U.S. Military Weapons and Hardware Supplier

Image
  A state-sponsored hacking group with links to Russia has been linked to attack infrastructure that spoofs the Microsoft login page of Global Ordnance, a legitimate U.S.-based military weapons and hardware supplier. read more 

Chinese Hackers Target Middle East Telecoms in Latest Cyber Attacks

Image
A malicious campaign targeting the Middle East is likely linked to Backdoor Diplomacy, an advanced persistent threat (APT) group with ties to China. read more 

Need to Know About Emotet in 2022

Image
For 6 months, the infamous Emotet botnet has shown almost no activity, and now it's distributing malicious spam. Let's dive into details and discuss all you need to know about the notorious malware to combat it . read more

Microsoft Warns of Hackers Using Google Ads to Distribute Royal Ransomware

Image
  A developing threat activity cluster has been found using Google Ads in one of its campaigns to distribute various post-compromise payloads, including the recently discovered Royal ransomware. read more

PCspooF New Vulnerability Affects Networking Tech Used by Spacecraft and Aircraft

Image
  A novel attack method has been disclosed against a crucial piece of technology called time-triggered ethernet (TTE) that's used in safety-critical infrastructure, potentially causing the failure of systems powering spacecraft and aircraft. read more

Microsoft Blames Russian Hackers for Prestige Ransomware Attacks on Ukraine and Poland

Image
Microsoft  on Thursday attributed the recent spate of ransomware incidents targeting transportation and logistics sectors in Ukraine and Poland to a threat cluster that shares overlap with the Russian state-sponsored Sandworm group.  read more

Russian-Canadian National Charged Over Involvement in LockBit Ransomware Attacks

Image
  The U.S. Department of Justice (DoJ) has announced charges against a dual Russian and Canadian national for his alleged participation in LockBit ransomware attacks across the world. read more

Several Cyber Attacks Observed Leveraging IPFS Decentralized Network

Image
  A number of phishing campaigns are leveraging the decentralized InterPlanetary Filesystem (IPFS) network to host malware, phishing kit infrastructure, and facilitate other attacks. read more

New Laplas Clipper Malware Targeting Cryptocurrency Users via SmokeLoader

Image
Cryptocurrency users are being targeted with a new clipper malware strain dubbed Laplas by means of another malware known as SmokeLoader. read more

Robin Banks Phishing Service for Cybercriminals Returns with Russian Server

Image
  A phishing-as-a-service (PhaaS) platform known as Robin Banks has relocated its attack infrastructure to DDoS-Guard, a Russian provider of bulletproof hosting services. read more

Microsoft Warns of Uptick in Hackers Leveraging Publicly-Disclosed 0-Day Vulnerabilities

Image
Microsoft is warning of an uptick among nation-state and criminal actors increasingly leveraging publicly-disclosed zero-day vulnerabilities for breaching target environments. read more

Researchers Uncover 29 Malicious PyPI Packages Targeted Developers with W4SP Stealer

Image
Cybersecurity researchers have uncovered 29 packages in Python Package Index (PyPI), the official third-party software repository for the Python programming language, that aim to infect developers' machines with a malware called W4SP Stealer. read more

Researchers Detail New Malware Campaign Targeting Indian Government Employees

Image
The Transparent Tribe threat actor has been linked to a new campaign aimed at Indian government organizations with trojanized versions of a two-factor authentication solution called Kavach. read more

Why Identity and Access Management Governance is a Core Part of Your SaaS Security

Image
  Every SaaS app user and login is a potential threat; whether it's bad actors or potential disgruntled former associates, identity management and access control are crucial to prevent unwanted or mistaken entrances to the organization's data and systems. read more

Chinese Hackers Using New Stealthy Infection Chain to Deploy LODEINFO Malware

Image
  The Chinese state-sponsored threat actor known as Stone Panda has been observed employing a new stealthy infection chain in its attacks aimed at Japanese entities. read more

Fodcha DDoS Botnet Resurfaces with New Capabilities

Image
The threat actor behind the Fodcha distributed denial-of-service (DDoS) botnet has resurfaced with new capabilities, researchers reveal. This includes changes to its communication protocol and the ability to extort cryptocurrency payments in exchange for stopping the DDoS attack against a target, Qihoo 360's Network Security Research Lab said in a report published last week. read more

Australian Health Insurer Medibank Suffers Breach Exposing 3.9 Million Customers Data

Image
Australian health insurance firm Medibank on Wednesday disclosed that the personal information of all of its customers had been unauthorizedly accessed following a recent ransomware attack. read more

Raspberry Robin Operators Selling Cybercriminals Access to Thousands of Endpoints

Image
  The Raspberry Robin worm is becoming an access-as-a-service malware for deploying other payloads, including IcedID, Bumblebee, TrueBot (aka Silence), and Clop ransomware. read more

British Hacker Charged for Operating "The Real Deal" Dark Web Marketplace

Image
  A 34-year-old U.K. national has been arraigned in the U.S. for operating a dark web marketplace called The Real Deal that specialized in the sales of hacking tools and stolen login credentials. read more