Tag: Techniques
-
New Malware Hijacks Docker Images Using Unique Obfuscation Technique
A recently uncovered malware campaign targeting Docker, one of the most frequently attacked services according to Darktrace’s honeypot …
-
Detecting And Blocking DNS Tunneling Techniques Using Network Analytics
DNS tunneling is a covert technique that cybercriminals use to bypass traditional network security measures and exfiltrate data or …
-
Researchers Uncover Stealthy Tactics and Techniques of StrelaStealer Malware
Cybersecurity experts have recently shed light on the sophisticated operations of StrelaStealer, also known by its alias Strela, revealing …
-
New ‘Waiting Thread Hijacking’ Malware Technique Evades Modern Security Measures
Security researchers have unveiled a new malware process injection technique dubbed “Waiting Thread Hijacking” (WTH), designed to …
-
Fortinet Releases Advisory on New Post-Exploitation Technique for Known Vulnerabilities
Fortinet is aware of a threat actor creating a malicious file from previously exploited Fortinet RCE vulnerabilities within FortiOS and …
-
Stripe API Skimming Campaign Unveils New Techniques for Theft
A new skimming attack leveraging the Stripe API to steal payment information has been uncovered by cybersecurity researchers at Jscrambler. …
-
New Phishing Attack Combines Vishing and DLL Sideloading Techniques
A new sophisticated phishing attack leveraging vishing, remote access tools and DLL sideloading has been uncovered by threat analysts. The …
-
The Ultimate Guide to Ethical Hacking: Top Tools and Techniques for 2025
Hack the Future: Top Ethical Hacking Tools & Techniques You Need in 2025 Cybersecurity threats are evolving, and ethical hacking has become …
-
Banking Malware Infects 248,000 Mobile Users Through Social Engineering Techniques
In 2024, the number of users affected by mobile banking malware skyrocketed to nearly 248,000, a staggering 3.6-fold increase from the …
-
Top 10 Scam Techniques: What You Need to Know
Scammers are highly resourceful and cunning when devising new ways to swindle people. But they often rely on long-standing persuasion …
-
SocGholish’s Intrusion Techniques Facilitate Distribution of RansomHub Ransomware
Trend Research analyzed SocGholish’s MaaS framework and its role in deploying RansomHub ransomware through compromised websites, using …
●●●