Cyber Attack
Threat Actors Forcing victims Into Entering Login Credentials For Stealing
Recent intelligence indicates a new technique employed by stealers to trick victims into entering credentials directly into a browser, enabling subsequent theft from the...
Backdoor
UNC2970 Hackers Attacking Job Seekers Using Weaponized PDF Reader
UNC2970, a North Korean cyber espionage group, used customized SumatraPDF trojans to deliver MISTPEN backdoors to victims through phishing emails pretending to be job...
Cyber Attack
Medusa Ransomware Exploiting Fortinet Flaw For Sophisticated Ransomware Attacks
Medusa, a relatively new ransomware group, has gained notoriety for its dual-pronged online presence. Unlike its peers, Medusa maintains a visible profile on the...
Cyber Attack
New RansomHub Attack Killing Kaspersky’s TDSSKiller To Disable EDR
RansomHub has recently employed a novel attack method utilizing TDSSKiller and LaZagne, where TDSSKiller, traditionally used to disable EDR systems, was deployed to compromise...
Cyber Attack
Chinese Hackers Using Open Source Tools To Launch Cyber Attacks
Three Chinese state-backed threat groups, APT10, GALLIUM, and Stately Taurus, have repeatedly employed a modified version of the open-source network scanning tool NBTscan over...
CVE/vulnerability
ToddyCat APT Abuses SMB, Exploits IKEEXT A Exchange RCE To Deploy ICMP Backdoor
ToddyCat is an APT group that has been active since December 2020, and primarily it targets the government and military entities in Europe and...
Cyber Attack
Halliburton Confirms that Hackers Stolen Data in Cyber Attack
Halliburton Company has confirmed that a cyber attack led to unauthorized access and data theft from its systems.The incident, which came to light on...
Cyber Attack
New Fury Stealer Attacking Victims to Steal Login Passwords
A new malicious software named "Fury Stealer" has been detected, posing a significant threat to online security.The malware, created by an unidentified threat...