Category: hacking attacks

ShroudedSnooper: New Cyber Threat on Middle East Telecom Providers with Stealthy Backdoor HTTPSnoop

ShroudedSnooper: New Cyber Threat on Middle East Telecom Providers with Stealthy Backdoor HTTPSnoop

Middle East Telecom Companies Targeted by New Intrusion Set, ShroudedSnooper Main Points Newly discovered intrusion set, ShroudedSnooper, targets Middle Eastern Telecom Service Providers ShroudedSnooper employs an effective backdoor named HTTPSnoop HTTPSnoop uses unique techniques to interact with Windows HTTP kernel drivers and devices It listens to incoming requests for specific HTTP(S) URLs and executes that

Read More
Unmasking Earth Lusca: Exploring the New Linux Backdoor, SprySOCKS

Unmasking Earth Lusca: Exploring the New Linux Backdoor, SprySOCKS

Earth Lusca’s New Surprise: A Fresh Linux Backdoor Overview Earth Lusca, a China-linked threat actor, has been spotted targeting government entities with a new Linux backdoor named SprySOCKS. Earth Lusca was first observed by cybersecurity firm Trend Micro in January 2022. The threat group has targeted both public and private sector entities across Asia, Australia,

Read More
“Unveiling Operation Rusty Flag: A Deep Dive into Azerbaijan’s Cybersecurity Threat”

“Unveiling Operation Rusty Flag: A Deep Dive into Azerbaijan’s Cybersecurity Threat”

Overview of Operation Rusty Flag Targets in Azerbaijan are experiencing a new campaign, aiming to dispatch Rust-based malware on manipulated systems. Cybersecurity firm Deep Instinct has named and is monitoring this operation as Operation Rusty Flag. There’s no current connection to any recognized threat group or actor. According to the security researchers, Operation Rusty Flag

Read More
Understanding XWorm: A Deep Dive into the New Trojan Threat

Understanding XWorm: A Deep Dive into the New Trojan Threat

XWorm: The New Kid on the Trojan Block – A new addition to the remote access trojan (RAT) family, XWorm, is emerging as a major global threat. – XWorm has undergone significant upgrades since its first appearance in 2022, improving its functionality and resilience. – A team of analysts from ANY.RUN have recently encountered the

Read More
“Unmasking the Risks: The Impact of Generative AI Tools on Data Privacy and Security”

“Unmasking the Risks: The Impact of Generative AI Tools on Data Privacy and Security”

Generative AI Tools: Are Your Secrets Safe? Main Points: – Generative AI tools, like ChatGPT, are gaining in popularity rapidly. – According to Gartner’s report, these AI tools pose potential risks to data privacy and security. – A new webinar, featuring a top-level executive from Fortune 100 and the CEO of LayerX, offers insightful discussions

Read More
“Exposed: 12,000 Juniper Firewalls Susceptible to Remote Code Execution Flaw CVE-2023-36845”

“Exposed: 12,000 Juniper Firewalls Susceptible to Remote Code Execution Flaw CVE-2023-36845”

Thousands of Juniper Firewalls Vulnerable to Remote Exploit Overview Almost 12,000 Juniper firewall devices at risk due to a recently revealed remote code execution flaw. VulnCheck found that the exploit for CVE-2023-36845 can be used by an unauthenticated and remote attacker to carry out arbitrary code. The CVE-2023-36845 pertains to a security loophole that can

Read More
“Unmasking Transparent Tribe: How a Threat Actor Disguises as YouTube to Deploy CapraRAT on Android Devices”

“Unmasking Transparent Tribe: How a Threat Actor Disguises as YouTube to Deploy CapraRAT on Android Devices”

Transparent Tribe Mimics YouTube to Spread CapraRAT: A Sneaky Android Trojan Tale Main Points Suspected Pakistan-affiliated threat actor, Transparent Tribe, uses malicious Android apps imitating YouTube to spread CapraRAT mobile remote access trojan (RAT). CapraRAT serves as a highly intrusive tool providing the attacker control over a bulk of data on infected Android devices, as

Read More
“Major Microsoft Data Leak: Response, Repair and Lessons Learned”

“Major Microsoft Data Leak: Response, Repair and Lessons Learned”

Microsoft Patches Major Data Leak – Microsoft corrected a massive security oversight that resulted in the exposure of 38 terabytes of private data. – The leak was found in the company’s AI GitHub repository. – The failure occurred unintentionally when open-source training data was released. – The released information also featured a disk backup from

Read More
Unmasking AMBERSQUID: Exploiting Uncommon AWS Services for Cryptocurrency Mining

Unmasking AMBERSQUID: Exploiting Uncommon AWS Services for Cryptocurrency Mining

Main Points: – AMBERSQUID is a new cloud-native cryptojacking operation targeting uncommon AWS offerings like AWS Amplify, AWS Fargate, and Amazon SageMaker for illegal cryptocurrency mining. – AMBERSQUID’s activity has been spotted and named by Sysdig, a security firm specializing in cloud and container security. – Interestingly, AMBERSQUID managed to exploit these services without tripping

Read More
“Unmasking Hook: The Android Banking Trojan Born from ERMAC’s Legacy”

“Unmasking Hook: The Android Banking Trojan Born from ERMAC’s Legacy”

New Analysis Reveals Android Banking Trojan ‘Hook’ Based On ‘ERMAC’ The Android banking Trojan called ‘Hook’ is discovered to be based on its precursor, ‘ERMAC’. This revelation is a result of an analysis conducted by NCC Group’s Security Researchers. All commands (totalling 30) that could be sent to an ERMAC-infected device can also control a

Read More
0

Your Cart Is Empty

No products in the cart.