Category: hacking attacks

Gamaredon: Swift Data Exfiltration in Under an Hour

Gamaredon: Swift Data Exfiltration in Under an Hour

Gamaredon: Data Exfiltration in Record Time Introduction The Russia-linked threat actor, Gamaredon, has been making waves in the cybersecurity world with its swift data exfiltration activities. Researchers have discovered that this group is capable of extracting sensitive data within just one hour of infiltrating a system. Main Points: – Gamaredon, a Russian-based threat actor, is

Read More
Exploring Browser Fingerprinting: Benefits for Website Owners and Users

Exploring Browser Fingerprinting: Benefits for Website Owners and Users

browser fingerprinting, website owners can better understand their audience, personalize their user experience, and improve their analytics. Additionally, it can also help with fraud detection and optimize login security. How does it work? Well, when you visit a website, your browser transmits a ton of information about itself and your computer. This includes details like

Read More
New JavaScript Dropper ‘PindOS’ Unleashing Bumblebee and IcedID Malware

New JavaScript Dropper ‘PindOS’ Unleashing Bumblebee and IcedID Malware

New JavaScript Dropper ‘PindOS’ discovered delivering Bumblebee and IcedID Malware Meet PindOS, the new JavaScript dropper in town. Cybersecurity firm Deep Instinct has tracked its activities, observing it as a carrier for next-stage payloads such as Bumblebee and IcedID malware. Technically, dropper malware is the plug that enables advanced attackers to deliver their sophisticated payloads.

Read More
NSA Releases Guidance to Detect and Prevent BlackLotus Bootkit Infections on UEFI Firmware

NSA Releases Guidance to Detect and Prevent BlackLotus Bootkit Infections on UEFI Firmware

bootkit that targets UEFI firmware, which is responsible for initializing hardware components and launching the operating system. Once the bootkit infects a system, it can survive even if the operating system is reinstalled, as it resides in the UEFI firmware. To help organizations detect and prevent infections, the NSA has released guidance that includes step-by-step

Read More
New Cryptocurrency Mining Attack Targets Linux Systems and IoT Devices

New Cryptocurrency Mining Attack Targets Linux Systems and IoT Devices

New Cryptocurrency Mining Attack Targets Linux Systems and IoT Devices Overview: A new campaign is targeting internet-facing Linux systems and Internet of Things devices. The intention is to steal device resources for mining cryptocurrency. Microsoft researcher Rotem Sde-Or has described the attackers as using a backdoor with a range of tools and components. Details: The

Read More
ScarCruft Utilizes New Information-Stealing Malware with Wiretapping Features and Golang-Based Backdoor

ScarCruft Utilizes New Information-Stealing Malware with Wiretapping Features and Golang-Based Backdoor

ScarCruft Uses New Information-Stealing Malware and Golang-Based Backdoor Introduction Recent reports from AhnLab Security’s Emergency response Center indicate that North Korean threat actor, ScarCruft, has been using sophisticated malware to steal valuable information from its targets. This malware, which has previously undocumented wiretapping features, uses a backdoor developed using Golang to exploit the Ably real-time

Read More
Operation Triangulation: iOS Spyware Steals Keystrokes, Contacts, GPS Location, and More via Fake WhatsApp and Telegram Websites

Operation Triangulation: iOS Spyware Steals Keystrokes, Contacts, GPS Location, and More via Fake WhatsApp and Telegram Websites

cybersecurity company added that the malware is capable of stealing a wide range of data, including: – Keystrokes – Contacts – GPS location – WhatsApp and Viber messages – Text messages – Photos and videos It can also record audio when the victim is making a call or when a specific location is reached. According

Read More
“Reducing Friction in Information Security Controls for Improved Productivity and Progress in Tech”

“Reducing Friction in Information Security Controls for Improved Productivity and Progress in Tech”

tech goals can be daunting, but breaking them down into smaller, evergreen outcomes can help streamline the process. One of these outcomes is reducing friction caused by information security controls. This is a crucial aspect of tech, as security controls can often slow down productivity and impede progress. To reduce friction, it’s important to identify

Read More
Microsoft Azure AD OAuth Process Vulnerability Could Lead to Full Account Takeover

Microsoft Azure AD OAuth Process Vulnerability Could Lead to Full Account Takeover

Microsoft Azure AD OAuth Process Could Have Led to Full Account Takeover, Researchers Say The Issue: Authentication Implementation Flaw in Microsoft Azure AD A security weakness in the Microsoft Azure Active Directory (AD) Open Authorization (OAuth) process may have allowed hackers to gain access to full account takeover. The vulnerability was discovered and reported by

Read More
“Chinese State-Sponsored Hacker Group Flea Targets Foreign Affairs Ministries in Americas using New Backdoor Graphican”

“Chinese State-Sponsored Hacker Group Flea Targets Foreign Affairs Ministries in Americas using New Backdoor Graphican”

Chinese State-Sponsored Actor Targets Foreign Affairs Ministries in the Americas New Backdoor Codenamed Graphican Used in Recent Cyber Attacks Broadcom’s Symantec has reported that a Chinese state-sponsored hacker group named Flea has recently launched cyber attacks on foreign affairs ministries in the Americas. The campaign began in late 2022 and continued into early 2023. According

Read More
0

Your Cart Is Empty

No products in the cart.