Category: hacking attacks

Unmasking Phishing Techniques: The Return of QakBot through DarkGate and PikaBot Malware

Unmasking Phishing Techniques: The Return of QakBot through DarkGate and PikaBot Malware

Phishing Campaigns Pump Out Malware: DarkGate and PikaBot Tail QakBot’s Path Main points: – Phishing campaigns now deliver malware families like DarkGate and PikaBot. – These campaigns utilize tactics observed in attacks that used the now-extinct QakBot trojan. – Initial infection happens through hijacked email threads. – Unique URLs restricting user access are in place.

Read More
“Lumma Stealer Update: Harnessing Trigonometry to Evade Cybersecurity Detection”

“Lumma Stealer Update: Harnessing Trigonometry to Evade Cybersecurity Detection”

Lumma Stealer Update: Evading Detection with Trigonometry Main Points from the Article: LummaC2, popularly known as Lumma Stealer, has been updated with an ingenious anti-sandbox technique that employs trigonometry principles. The updated technique is crafted to postpone the malware’s activation until it detects human mouse activity. Alberto MarĂ­n, a security researcher at Outpost24, has elucidated

Read More
Navigating the Digital Threat Landscape: A Comprehensive Guide for Cybersecurity Leaders

Navigating the Digital Threat Landscape: A Comprehensive Guide for Cybersecurity Leaders

Staying Safe in Cyberspace: Navigating an Evolving Threat Landscape Main Points: – Security leaders now need to manage a constantly changing attack surface due to interconnected devices, cloud services, IoT technologies, and hybrid work environments. – Adversaries are constantly developing new attack techniques, placing an increasing burden on companies to stay updated. – Not all

Read More
“Old Bitcoin Wallets at Risk: Unmasking the Randstorm Exploit”

“Old Bitcoin Wallets at Risk: Unmasking the Randstorm Exploit”

Bitcoins Old Wallets – On the ‘Brink’ of Exploitation through Randstorm Bitcoin wallets made between 2011 and 2015 can be compromised by a new exploit: Randstorm. Randstorm can recover passwords and secure unauthorized access to a multitude of wallets across different blockchain platforms. The term “Randstorm()” encapsulates a blend of bugs, design choices and API

Read More
Unmasking Appin Security Group: From Educational Startup to Global Cyber-Espionage Powerhouse

Unmasking Appin Security Group: From Educational Startup to Global Cyber-Espionage Powerhouse

**Main Points of the Article:** – An Indian group known as Appin Security Group, initially an educational startup, has been involved in cyber-espionage and disruption for over a decade. – They have targeted the U.S., China, Myanmar, Pakistan, Kuwait, and other countries. – An in-depth analysis by SentinelOne revealed the Group’s covert operations and strategies.

Read More
“Unveiling Cyber Threats: An Exploration of 8Base, Phobos Ransomware and SmokeLoader Trojan”

“Unveiling Cyber Threats: An Exploration of 8Base, Phobos Ransomware and SmokeLoader Trojan”

The threat actors behind the 8Base ransomware are using a variant of Phobos ransomware for their cyber attacks. Cisco Talos has noted the increased activities of these cybercriminals. Most of the Phobos variants, as per Guilherme Venere, are being disseminated by SmokeLoader, a backdoor Trojan. Ransomware Roughians: Phobos and 8Base As if cyber threats weren’t

Read More
Decoding LitterDrifter: Inside Russian FSB’s Cyber Espionage Tactics Unveiled by Check Point

Decoding LitterDrifter: Inside Russian FSB’s Cyber Espionage Tactics Unveiled by Check Point

A Peek into LitterDrifter: The Cyber Espionage Tool of FSB Main Points: FSB-affiliated Russian cyber espionage actors are using a USB worm called LitterDrifter. LitterDrifter has been deployed against Ukrainian entities. Check Point has detailed the latest tactics of the group known as Gamaredon, aka Aqua Blizzard, Iron Tilden, Primitive Bear, Shuckworm, and Winterflounder. These

Read More
“SEO#LURKER: How Cybercriminals Manipulate Google Ads and Search Results to Spread Malware”

“SEO#LURKER: How Cybercriminals Manipulate Google Ads and Search Results to Spread Malware”

Cybercriminals manipulate Google search results and ads to trick users into downloading malware. Software such as WinSCP are being illegitimately used as a trap for users. Security firm Securonix has labelled this malicious activity as SEO#LURKER. An ad leads to a compromised WordPress website which further redirects the user to malicious activity. Duping through Deceptive

Read More
“FCC Fights Back: New Measures to Protect Against SIM Swapping and Port-Out Fraud”

“FCC Fights Back: New Measures to Protect Against SIM Swapping and Port-Out Fraud”

The FCC steps up to protect against SIM Swapping – FCC introduces new rules to guard consumers against cell phone account scams – The regulations target fraud methods like SIM-swapping and port-out fraud – This move can prevent malicious actors from targeting personal information The FCC Strikes Back Against Fraudsters Breaking news in the tech

Read More
“Stormy Cyberspace: Understanding Cloud Attack Landscape in 2023 and How to Navigate it”

“Stormy Cyberspace: Understanding Cloud Attack Landscape in 2023 and How to Navigate it”

Stormy Weather in Cyberspace: Navigating the Cloud Attack Landscape Main Points: In 2023, cloud computing is not merely a technology, but a battleground for cybersecurity. Threats such as Zenbleed, Kubernetes attacks, and sophisticated Advanced Persistent Threats (APTs) are prevalent. A webinar titled ‘Navigating the Cloud Attack Landscape: 2023 Trends, Techniques, and Tactics’ is set to

Read More
0

Your Cart Is Empty

No products in the cart.