Category: hacking attacks

“Telegram’s Dark Side: The Rapid Rise of Illicit Activities on Online Messaging Platforms”

“Telegram’s Dark Side: The Rapid Rise of Illicit Activities on Online Messaging Platforms”

**Main Points:** – Rapid growth of illicit activities across online messaging platforms. – Telegram: a popular platform among malicious actors. – Telegram’s features of accessibility, popularity, and user anonymity make it attractive to threat actors. – The industry’s growing concern about the increased malicious activities on Telegram. Online Messages aren’t all ‘lol’ and ‘ty’: The

Read More
Unmasking Cloudzy: An Iranian Company Powering Cyber Threats Globally

Unmasking Cloudzy: An Iranian Company Powering Cyber Threats Globally

**Main Points:** – A relatively unknown Iranian company, Cloudzy, offers services used by various threat groups including cybercrime organizations and nation-state actors. – Cloudzy is registered in the U.S but it is suspected to operate from Tehran, Iran, potentially violating U.S. sanctions. – The company is managed by a person named Hassan Nozari, according to

Read More
“Zero-Day Ivanti EPMM Flaw Exploited by APT Actors: A Cybersecurity Alert for Norwegian Entities”

“Zero-Day Ivanti EPMM Flaw Exploited by APT Actors: A Cybersecurity Alert for Norwegian Entities”

APT Actors Exploit Zero-Day Flaw in Ivanti EPMM, Impacting Norwegian Entities Main Points: – Advanced persistent threat (APT) actors exploited a critical flaw in Ivanti Endpoint Manager Mobile (EPMM). – The zero-day has been in use since at least April 2023. – Attacks directed against Norwegian entities, including a government network. – The disclosure is

Read More
“NodeStealer 2.0: A Python Variant Threatens Facebook Business and Cryptocurrency Security”

“NodeStealer 2.0: A Python Variant Threatens Facebook Business and Cryptocurrency Security”

# Python Variant of Stealer Malware Targets Facebook Business, Crypto Coffers Here are the main points to glean from this situation: – Cybersecurity researchers have discovered a Python variant of the NodeStealer malware. – The malware is equipped to seize control of Facebook business accounts and syphon cryptocurrency. – Palo Alto Network Unit 42 reported

Read More
“Unmasking SpyNote: The Android Banking Trojan Threatening European Bank Customers”

“Unmasking SpyNote: The Android Banking Trojan Threatening European Bank Customers”

Main Points European bank customers are being attacked by an Android banking trojan named SpyNote. The spyware is being sent out through email and smishing (SMS phishing) campaigns. Italian cybersecurity firms detected this dangerous campaign in June and July of 2023. The fraudulent activities operate by using both remote access trojan (RAT) capabilities and vishing

Read More
“Unleashing Data Security Posture Management (DSPM): Revamping Cloud Security in the Modern Digital Landscape”

“Unleashing Data Security Posture Management (DSPM): Revamping Cloud Security in the Modern Digital Landscape”

Data Security Posture Management (DSPM): A new approach to Cloud Security Data Security Posture Management (DSPM) assures proper security measures are in place on data regardless of its location. The concept of DSPM confronts the security risk that arises from data duplication or movement. As the saying goes, “a good defense is a great offense!”

Read More
“Unraveling APT31’s Cyber Attacks: China-Linked Hackers Target Eastern European Industrials”

“Unraveling APT31’s Cyber Attacks: China-Linked Hackers Target Eastern European Industrials”

Chinese-Linked Hacking Crew Suspected of Attacks on Eastern European Industries – APT31, a hacker group linked to China, is suspected of executing a series of data theft attacks last year on industrial organizations in Eastern Europe. – Cybersecurity firm Kaspersky has ascribed the cyber-attacks to APT31, also denoted as Bronze Vinewood, with medium to high

Read More
Unraveling WikiLoader: The New Malware Strain Targeting Italian Organizations

Unraveling WikiLoader: The New Malware Strain Targeting Italian Organizations

A “Phishy” Situation in Italy – A new phishing campaign has been targeted towards organizations in Italy. – The campaign deploys a new strain of malware: WikiLoader. – The ultimate goal is to install a banking trojan, stealer, and spyware known as Ursnif, or Gozi. – The software is a highly sophisticated downloader, with the

Read More
Microsoft Links Active Exploitation of Critical Flaw in Progress Software to Lace Tempest: Vulnerability Details, Exploitation, and Attribution

Microsoft Links Active Exploitation of Critical Flaw in Progress Software to Lace Tempest: Vulnerability Details, Exploitation, and Attribution

Microsoft Links Active Exploitation of Critical Flaw in Progress Software to Lace Tempest Microsoft has identified the ongoing active exploitation of a critical flaw in the Progress Software MOVEit Transfer application and has attributed it to a threat actor known as Lace Tempest. This threat actor is closely monitored by the Microsoft Threat Intelligence team.

Read More
Decoy Dog: The Supercharged Upgrade to Pupy RAT – Unveiling the Capabilities of this Advanced Malware

Decoy Dog: The Supercharged Upgrade to Pupy RAT – Unveiling the Capabilities of this Advanced Malware

Decoy Dog: The Supercharged Upgrade to Pupy RAT Introduction In the world of cybersecurity, new threats are constantly emerging. One such threat is Decoy Dog, a malware that has recently been discovered. It turns out that this malware is not your average one – it’s a significant upgrade over the Pupy RAT, an open-source remote

Read More
0

Your Cart Is Empty

No products in the cart.