Russian Hackers Target Ukraine with Disinformation and Credential-Harvesting Attacks

Cybersecurity researchers have unearthed a new influence operation targeting Ukraine that leverages spam emails to propagate war-related disinformation.The activity has been linked to Russia-aligned...

From Alert to Action: How to Speed Up Your SOC Investigations

Processing alerts quickly and efficiently is the cornerstone of a Security Operations Center (SOC) professional's role. Threat intelligence platforms can significantly enhance their ability...

Lazarus Hackers Exploited Windows Kernel Flaw as Zero-Day in Recent Attacks

The notorious Lazarus Group actors exploited a recently patched privilege escalation flaw in the Windows Kernel as a zero-day to obtain kernel-level access and...

WordPress Plugin Exploited to Steal Credit Card Data from E-commerce Sites

Unknown threat actors are abusing lesser-known code snippet plugins for WordPress to insert malicious PHP code in victim sites that are capable of harvesting...

Google Takes Down Influence Campaigns Tied to China, Indonesia, and Russia

Google has revealed that it took down 1,320 YouTube channels and 1,177 Blogger blogs as part of a coordinated influence operation connected to the...
tor

Bitcoin Robbery Through Fake Tor Browser

Through the years, Bitcoin and Tor have gone hand in hand due to their assurance of anonymity and privacy. But it seems that in...

npm packages found uploading user details on a GitHub page

Four JavaScript npm bundles contained pernicious code that gathered client subtleties and transferred the data to a public GitHub page. Every one of the four...

Indigo Says Its Servers Hacked During Early Days Of December

IndiGO on Thursday expressed that its workers were hacked during the beginning of December, and didn't preclude the likelihood that programmers may transfer some...

New P2PInfect Botnet MIPS Variant Targeting Routers and IoT Devices

Cybersecurity researchers have discovered a new variant of an emerging botnet called P2PInfect that's capable of targeting routers and IoT devices. The latest version, per...

Webinar — Psychology of Social Engineering: Decoding the Mind of a Cyber Attacker

In the ever-evolving cybersecurity landscape, one method stands out for its chilling effectiveness – social engineering. But why does it work so well? The...

Follow Us Here!

372FansLike
332FollowersFollow
323FollowersFollow

Popular Posts