Tag: Cyberattackers
-
Cyberattackers Exploit Google Sheets for Malware Control in Likely Espionage Campaign
Cybersecurity researchers have uncovered a novel malware campaign that leverages Google Sheets as a command-and-control (C2) mechanism. The …
-
Cyberattackers Exploit Google Sheets for Malware Control in Global Espionage Campaign
Cybersecurity researchers have uncovered a novel malware campaign that leverages Google Sheets as a command-and-control (C2) mechanism. The …
-
‘Hunters International’ Cyberattackers Take Over Hive Ransomware
Hunters International appears to have acquired Hive ransomware from its original operators and may be seeking to cash in on the malware’s …
-
Sandworm Cyberattackers Down Ukrainian Power Grid During Missile Strikes
A premier Russian APT used living-off-the-land techniques in a major OT hit, raising tough questions about whether or not we can defend …
-
Kinsing Cyberattackers Debut ‘Looney Tunables’ Cloud Exploits
Admins need to patch immediately, as the prolific cybercrime group pivots from cryptomining to going after cloud secrets and …
-
Microsoft: 0ktapus Cyberattackers Evolve to ‘Most Dangerous’ Status
The English-speaking cyberattack group behind the MGM and Caesars Entertainment attacks is adding unique capabilities and gaining in …
-
Cyberattackers Alter Implant on 30K Compromised Cisco IOS XE Devices
A seemingly sharp drop in the number of compromised Cisco IOS XE devices visible on the Internet led to a flurry of speculation over the …
-
Cyberattackers Swarm OpenFire Cloud Servers With Takeover Barrage
The Kinsing threat group has launched more than 1,000 cyberattacks in less than two months, exploiting a security vulnerability in the …
-
Cyberattackers Target the Latin American Health Care Sector
Cyberattacks on the healthcare sector are a growing threat in Latin America, and the large amount of confidential data these organizations …
-
‘Asylum Ambuscade’ Cyberattackers Blend Financial Heists & Cyber Espionage
In a rare mix of motivations, the cyberattack group has been linked to both financial cybercrime and political spying efforts on …
-
‘Blatantly Obvious’: Spyware Offered to Cyberattackers via PyPI Python Repository
Malware-as-a-service hackers from Spain decided to use a public code repository to openly advertise their …
-
3CX Breach Widens as Cyberattackers Drop Second-Stage Backdoor
“Gopuram” is a backdoor that North Korea’s Lazarus Group has used in some campaigns dating back to 2020, some researchers …
●●●