New Stealthy Linux Malware PUMAKIT With Unique Privilege Escalation Methods
Security researchers at Elastic Security Labs have uncovered a sophisticated Linux malware dubbed PUMAKIT, which employs advanced stealth techniques and unique privilege escalation methods to maintain persistence on infected systems.
PUMAKIT's multi-stage architecture consists of...
China-Linked Salt Typhoon Hackers Launched Cyber Attack on AT&T and Verizon
Major U.S. telecom companies AT&T Inc. and Verizon Communications Inc. confirmed they were targeted by the China-linked hacking group known as Salt Typhoon. Both companies stated that their networks are now secure and free...
Hackers Exploit Microsoft Management Console to Drop Backdoor Payloads on Windows
Securonix Threat Research team has uncovered a sophisticated tax-related phishing campaign that employs Microsoft Common Console Document (MSC) files and advanced obfuscation techniques to deliver a stealthy backdoor payload.
Dubbed the "FLUX#CONSOLE campaign," this...
Top Cyber Attacks In April 2025 You Need to Aware
April wasn’t quiet in the world of cybersecurity. From sneaky fake CAPTCHAs to region-targeted phishing and revamped ransomware, attackers kept busy, refining their tricks and finding new ways to slip past defenses.
Thanks to insights...
Japan Airlines System Hit by Cyber Attack, Flight Operations Affected
Japan Airlines (JAL), the nation’s second-largest airline, reported a significant cyberattack on its systems early Thursday morning, causing disruptions to both domestic and international flight operations.
The attack, which began at 7:24 AM local time...
U.S. Officials Warn Americans to Use Only Encrypted Messaging Apps
In the wake of an unparalleled cyberattack targeting major U.S. telecommunications providers, including AT&T, Verizon, and Lumen Technologies, federal officials have urged Americans to protect their communications by using encrypted messaging apps.
Microsoft has dubbed...
Casio UK Web Store Hacked to Inject Customer Credit Card Stealing Scripts
A sophisticated web-skimming campaign targeting multiple websites, including the UK online store of electronics giant Casio (casioco.uk).
The attack, which exposed sensitive customer data, highlights ongoing vulnerabilities in e-commerce platforms and the evolving tactics of...
U.S Intelligence Agencies Launched Cyber Attack on Chinese Tech Companies
The Chinese National Internet Emergency Center has discovered and resolved two significant cases of cyber espionage targeting Chinese technology companies and research institutions.
The attacks, suspected to have been orchestrated by U.S. intelligence agencies,...
Radiant Hacked – $50 Million USD Worth Crypto Stolen by North Korean Hackers
Radiant Capital, a prominent decentralized finance (DeFi) protocol, has fallen victim to a major security breach, resulting in the loss of approximately $50 million USD.
The attack, which exploited vulnerabilities in the devices of...
Destroying EDR Service Executable File by Using a Combination of Windows Symbolic Links
A new method of exploiting the "Bring Your Own Vulnerable Driver" (BYOVD) technique has emerged, combining it with Windows symbolic links to elevate its effectiveness.
This innovative approach exploits drivers with file-writing capabilities, bypassing the...