How hrserver.dll stealthy webshell can mimic Google’s Web Traffic to hide and...
In a striking revelation shaking the cybersecurity world, researchers have unearthed a sophisticated web shell, dubbed ‘HrServ,’ hidden within a seemingly innocuous DLL file, ‘hrserv.dll.’ This...
View ArticleHow to Bypass EDRs, AV with Ease using 8 New Process Injection Attacks
In the ever-evolving landscape of cybersecurity, researchers are continually uncovering new methods that challenge existing defense mechanisms. A recent study by SafeBreach, a leader in cybersecurity...
View ArticleInside the Scam: How Ransomware Gangs Fool You with Data Deletion Lies!
Recently, there has been an emergence of a new scam targeting victims of ransomware attacks. This scam involves individuals or groups posing as “security researchers” or “ethical hackers,” offering to...
View ArticleHow to exploit Windows Defender Antivirus to infect a device with malware
Trend Micro’s recent threat hunting efforts have uncovered active exploitation of CVE-2023-36025, a vulnerability in Microsoft Windows Defender SmartScreen, by a new strain of malware known as...
View ArticleMajor Python Infrastructure Breach – Over 170K Users Compromised. How Safe Is...
The Checkmarx Research team has unearthed a sophisticated attack campaign that leveraged fake Python infrastructure to target the software supply chain, affecting over 170,000 users, including the...
View ArticleEternal Malware: CVE-2024-3400 Rootkits Persist Through Palo Alto Firewalls...
The cybersecurity community has recently been abuzz with discussions surrounding CVE-2024-3400, a critical vulnerability affecting Palo Alto Networks’ PAN-OS, used in their popular firewall products....
View ArticleHackers’ Guide to Rogue VM Deployment: Lessons from the MITRE hack
In the rapidly evolving landscape of cybersecurity, sophisticated attacks continue to challenge even the most prepared organizations. A recent cyber intrusion targeting MITRE’s Networked...
View ArticleThis Hacker Toolkit Can Breach Any Air-Gapped System – Here’s How It Works
A recent investigation has uncovered a series of sophisticated cyber-attacks by the Advanced Persistent Threat (APT) group known as GoldenJackal, which successfully breached air-gapped government...
View ArticleTop 2 Malicious Python Packages You Must Avoid! Zebo-0.1.0 & Cometlogger-0.1
Fortinet’s FortiGuard Labs has recently uncovered two highly malicious Python packages, Zebo-0.1.0 and Cometlogger-0.1, which serve as a sobering reminder of the evolving sophistication of cyber...
View ArticleA Malware That EDR Can’t See?If You Rely on Antivirus for Protection, Read...
A sophisticated cyberespionage group known as Earth Preta (also called Mustang Panda) has been identified using advanced techniques to infiltrate systems and evade detection. Their stealthy approach...
View ArticleHow Lynx Ransomware Extorts Millions from U.S. Companies
First discovered on July 17, 2024, Lynx ransomware quickly made a name for itself by targeting high-profile U.S. companies and extorting millions in ransom payments. Built on the remnants of Quantum...
View ArticleBackdooring ATMs via Bootloader? These Hackers Showed It’s Still Possible in...
In a case that redefines the boundaries of modern cybercrime, a threat actor known as UNC2891 has carried out a multi-vector cyber-heist targeting ATM infrastructure across several banking...
View Article