Cyber Security News
New Malicious PyPI Packages Use DLL Sideloading In A Supply Chain Attack
Researchers have discovered that threat actors have been using open-source platforms and codes for several purposes, such as hosting C2 infrastructure, storing stolen data,...
Cyber Security News
Meta Unveils 8 Spyware Companies Targeting iOS, Android, & Windows Devices
Spyware firms target iOS, Android, and Windows devices due to their widespread usage, making them lucrative targets for gathering sensitive information. Each platform offers unique...
Cyber Security News
Hackers Abusing LSASS Process Memory to Exfiltrate Login Credentials
Threat actors have been using several methods for credential stealing, which varies based on the environment and infrastructure of the system.Most of the...
Cyber Security News
Sidewinder Hacker Group Using Weaponized Documents to Deliver Malware
Sidewinder APT group's sophisticated threat landscape reveals a skilled and persistent threat targeting the Nepalese Government entities. Their focus extends to South Asian governments, with...
Cyber Security News
Tech Device Manufacturers Urged by CISA to Remove Default Passwords
Recently, the Cybersecurity and Infrastructure Security Agency (CISA) has requested technology device manufacturers to take measures to eliminate default passwords due to the threats...
CVE/vulnerability
Over 50% of the Insider Attacks Uses Privilege Escalation Vulnerability
In the labyrinth of cybersecurity, the specter of insider threats emerges as a formidable adversary, wielding both malicious intent and unintentional foibles. This expose delves...
Cyber Security News
North Korean Hackers Posed as Job Recruiters and Seekers
Two ongoing efforts, Contagious Interview and Wagemole, have been identified to target job-seeking activities connected to North Korean Hackers and state-sponsored threat actors.Threat actors...
Cloud
Chinese APT Infrastructure Mimics Cloud Backup Services
Cambodian government entities were discovered to be targeted and compromised by Chinese APT actors.The threat actors are using the infrastructure to masquerade as...