North Korean threat actors, likely associated with BlueNoroff, have launched multi-stage malware attacks targeting cryptocurrency businesses, expanding their toolkit to include RustDoor/ThiefBucket and RustBucket campaigns. Hidden Risk, a DPRK-linked threat
Uncategorized
Beware of Fake Copyright Claims that Deliver Rhadamanthys Stealer Malware
Cybercriminals have launched a large-scale phishing attack using a new variant of Rhadamanthys Stealer, dubbed CopyRh(ight)adamantys, which targets individuals and organizations worldwide, falsely accusing them of copyright infringement. Attackers impersonate
North Korean Hackers Abuse Cloud-Based Services to Deploy Malware
ESET’s recent report details the activities of various advanced persistent threat (APT) groups from April to September 2024, highlighting key trends and developments observed during this period, including the use
Beware of Fake Copyright Claims That Deliver Rhadamanthys Stealer
Stealer malware is a type of malicious software designed to infiltrate computers and extract sensitive information. Once installed, it communicates with a command-and-control server operated by threat actors and enables
Threat Actors Attacking macOS Users With New Multi-stage Malware
Multi-stage malware means sophisticated cyberattack strategies that evolve in several steps. Recent developments in multi-stage malware highlight the increasing sophistication of cyber threats. SentinelOne researchers recently discovered that threat actors
Hackers Can Hijack Your MFA Enabled Email Accounts By Stealing Cookies
MFA enhances the security of email accounts by requiring users to provide additional verification beyond just their password. Implementing MFA reduces the risk of unauthorized access which makes it a
Hackers Use ZIP File Concatenation Tactic to Launch Undetected Attacks on Windows Users
Cybercriminals are utilizing a sophisticated evasion strategy called ZIP file concatenation to specifically target Windows users. This method combines several ZIP files into a single archive, making it harder for
Cisco Industrial Wireless Software Flaw Let Attackers Run Command As Root User
Hackers target Cisco primarily due to its critical role in global network infrastructure and security. Cisco’s devices are essential for protecting sensitive data and communications which makes them attractive targets
New SteelFox Malware Infected 11,000+ Windows Systems Mimics Software Activators
Hackers primarily target Windows systems due to their significant market share: Over 80% of desktop operating systems run Windows. Not only that even nearly 50% of hackers compromised Windows systems
LameDuck’s Skynet Botnet Launched 35,000+ DDoS Attacks
A DDoS attack is a malicious attempt to disrupt the normal functioning of a targeted server, service, and network with a flood of internet traffic from multiple compromised devices. DDoS