Hackers Abuse Windows Container Isolation Framework to Bypass Security Defences
Recently, cybersecurity researchers at Deep Instinct have asserted that hackers can exploit the Windows container isolation framework to bypass the security defenses and mechanisms of organizations.
Containers revolutionize the way applications are packaged and isolated,...
Five Families – Hackers Collaborate to Launch Notorious Cyber Attack
The Five Families unites the underground internet world, adopting the name of the 1950s-60s New York mafia's Italian-American clans.
This new group of "Five Families" involves five other groups, and here below, we have mentioned...
Top 3 Malware Loaders of 2023 that Fueling 80% of Cyber Attacks
SOC teams find malware loaders challenging, as the different loaders, even for the same malware, need distinct mitigation.
Besides this, they are the key and most important elements for initial network access and payload delivery,...
How Hackers Abusing ChatGPT Features For Their Cybercriminal Activities – Bypass Censorship
Media and frequent innovative releases aggressively fuel the rapid industry rise of generative AI (Artificial Intelligence) ChatGPT.
But, besides its innovative part, cybercriminals have also actively exploited these generative AI models for several illicit purposes,...
4 Cyber Threats that Frequently Evade Detection and How to Address Them
Some cyberattacks are just more evasive than others. While many attacks can be identified and blocked through a system that relies on threat signatures, many cannot and easily breeze through at least the initial...
Researchers Uncover New technique to Detect Malicious Websites
The internet domains serve as a launchpad for threat actors to launch several cyber attacks. By exploiting the internet domains as a launchpad platform, threat actors can perform the following activities on Malicious Websites:-
Distribute...
Kroll Suffers Data Breach as Employee Falls Victim to SIM Swap Hack
A high-profile cyber attack targeted a prominent company, Kroll. This attack utilized a sophisticated technique known as "SIM swapping," which allowed the threat actor to gain unauthorized access to sensitive personal information.
On Saturday, August 19,...
Threat and Vulnerability Roundup for the week of August 20th to 26th
Welcome to the Threat and Vulnerability Roundup, a weekly publication from Cyber Writes that provides the most recent news on cybersecurity. Use our wide coverage to stay up to date.
Critical flaws, exploits, and recent...
Smart Bulbs can be Hacked to Steal Wi-Fi Passwords
The current rise of the Internet of Things (IoT) is at its peak and rapidly expanding its abilities by transforming basic items into controllable smart devices via smartphones, including light bulbs and plugs.
In 2021,...
Cyber Criminals Turned Mac Systems into Proxy Exit Nodes
Besides Windows OS, now threat actors are also actively targeting Mac systems to accomplish their illicit goals. Cybersecurity analysts at AT&T Alien Labs recently observed that threat actors are actively turning Mac systems into...