threat actors
Evasive Panda Cyber Attacks: Threat Actor Targets Tibetans
Cybersecurity experts at ESET have come across a malicious campaign that targets Tibetans in many countries by leveraging the website of a religious gathering. Evasive Panda cyber attacks are associated with a ...
Python Snake Info Stealer Spreading Via Facebook Messages
As per recent reports, threat actors are increasingly leveraging Facebook messages to distribute the Python Snake Info Stealer malware. Researchers have noticed that threat actors are using three variants of the information ...
Cisco VPN Hijacking Flaw In Secure Client Software Patched
In light of recent events, Cisco has released patches for two high-severity network vulnerabilities in its Secure Client. As per recent reports, vulnerabilities leading to the Cisco VPN hijacking flaw are being ...
SMTP Smuggling: Hackers Exploit New Flaw For Spoof Emails
In the ever-evolving landscape of cyber threats via email, a novel exploitation technique has emerged – Simple Mail Transfer Protocol – SMTP smuggling. This method, when wielded by threat actors, poses a ...
Alert: New DLL Variant Used For Malicious Code Execution
Recent research findings have brought to light a new DLL variant pertaining to search order hijacking techniques. As per recent reports, this dynamic link library variant could potentially be used by threat ...
JavaScript Malware: 50,000+ Bank Users at Risk Worldwide
In a disconcerting revelation, a newly identified strain of JavaScript malware has set its sights on compromising online banking accounts, orchestrating a widespread campaign impacting over 40 financial institutions globally. This insidious ...
Kyivstar Cyber Attack: Ukraine Telecom Operator Paralyzed
Ukraine’s largest telecom operator, Kyivstar, was recently shut down after falling prey to a cyberattack. The Kyivstar cyber attack left millions of Ukrainians without access to cellular or internet services. Recent reports ...
Ledger Supply Chain Breach: $600,000 Theft Unveiled
Recent events have brought to light the Ledger supply chain breach, a cybercrime incident that led to the theft of $600,000 in virtual assets. For those who don’t know, Ledger is a ...
Code Execution Update: Improve WordPress Security
In the ever-evolving landscape of digital security, WordPress has recently released a critical code execution update, version 6.4.2, addressing a potential threat that could jeopardize the integrity of vulnerable sites. This update, ...
CACTUS Qlik Ransomware: Vulnerabilities Exploited
A cyberattack campaign dubbed the CACTUS Qlik Ransomware has become prominent in ransomware attacks on BI systems. Researchers have warned of threat actors exploiting three Qlik security vulnerabilities to target different organizations ...