Tag: Cyber Attack
-
ZLoader Malware Returns With DNS Tunneling to Stealthily Mask C2 Comms
Cybersecurity researchers have discovered a new version of the ZLoader malware that employs a Domain Name System (DNS) tunnel for …
-
Black Basta Ransomware Uses MS Teams, Email Bombing to Spread Malware
Black Basta Campaign Resurgence: Rapid7 researchers report a sophisticated social engineering campaign by the Black Basta ransomware group, …
-
Hackers Target Android Users via WhatsApp to Steal Sensitive Data
Researchers analyzed a malicious Android sample created using Spynote RAT, targeting high-value assets in Southern Asia, which, likely …
-
THN Recap: Top Cybersecurity Threats, Tools and Tips (Dec 2 – 8)
This week’s cyber world is like a big spy movie. Hackers are breaking into other hackers’ setups, sneaky malware is hiding in popular …
-
Cyberattack deluge hits Romanian election infrastructure
After compromising the Romanian Permanent Electoral Authority’s IT infrastructure on Nov. 19, threat actors went on to expose the account …
-
Russian Hackers Hijacked Pakistani Actor Servers For C2 Communication
Secret Blizzard, a Russian threat actor, has infiltrated 33 command-and-control (C2) servers belonging to the Pakistani group Storm-0156, …
-
HackSynth : Autonomous Pentesting Framework For Simulating Cyberattacks
HackSynth is an autonomous penetration testing agent that leverages Large Language Models (LLMs) to solve Capture The Flag (CTF) challenges …
-
Deloitte UK Hacked – Brain Cipher Group Claim to Have Stolen 1 TB of Data
Brain Cipher has claimed to have breached Deloitte UK and exfiltrated over 1 terabyte of sensitive data. Emerging in June 2024, Brain …
-
Cyberattack Prompts FBI to Urge Americans to Use Encrypted Messaging Apps
Officials from the FBI and the US Cybersecurity and Infrastructure Security Agency say Americans’ communications are vulnerable during …
-
Understanding the Evolve Bank Cyber Attack: A Timeline
Disclaimer: This document has been created with the sole purpose of encouraging discourse on the subject of cybersecurity and good security …
-
North Korean Kimsuky Hackers Use Russian Email Addresses for Credential Theft Attacks
The North Korea-aligned threat actor known as Kimsuky has been linked to a series of phishing attacks that involve sending email messages …
-
THN Recap: Top Cybersecurity Threats, Tools and Tips (Nov 25 – Dec 1)
Ever wonder what happens in the digital world every time you blink? Here’s something wild – hackers launch about 2,200 attacks every single …
●●●