Blind Eagle Attacking Organizations With Weaponized .url Files To Extract User Hash
The cybersecurity landscape has witnessed a concerning development as the threat actor group known as Blind Eagle (also tracked as APT-C-36) has launched a sophisticated campaign targeting organizations primarily in South America with a...
China-Nexus Group Hacked Juniper Networks and Implant Backdoors on Its Routers
In a significant cybersecurity breach discovered in mid-2024, a sophisticated threat actor deployed custom backdoors on Juniper Networks' Junos OS routers.
The intrusion represents an alarming development in the targeting of critical network infrastructure by...
Blind Eagle Hackers Leveraging Google Drive, Dropbox & GitHub To Bypass Security Defenses
A series of ongoing, targeted cyber campaigns by Blind Eagle (APT-C-36), one of Latin America's most dangerous threat actors primarily targeting Colombia's justice system, government institutions, and private organizations were recently unveiled by Check...
New Ebyte Ransomware Attacking Windows Users With Advanced Encryption Tactics
A sophisticated new ransomware strain dubbed "Ebyte" targeting Windows systems across North America and Europe.
The ransomware has compromised thousands of systems since its detection three weeks ago, utilizing advanced encryption tactics that have challenged...
Researcher Hacked Embedded Devices To Extract The Firmware
A security researcher known as newp1ayer48 has successfully demonstrated a method to extract firmware from IoT and embedded devices using direct Flash Memory dumps, providing valuable insights for security professionals and bug bounty hunters.
The...
Detecting Cyber Attack Patterns by Analyzing Threats Actors Infrastructure
The identification of cyber attack patterns through infrastructure analysis has emerged as a crucial methodology in modern threat intelligence.
By examining the digital footprints left by threat actors, security analysts can now reconstruct attack campaigns...
Operation Sea Elephant Attacking Organizations to Steal Research Details
A sophisticated cyber espionage campaign dubbed "Operation Sea Elephant" has been discovered targeting scientific research organizations, with a particular focus on ocean-related studies.
The operation, attributed to a threat actor group known as CNC with...
Threat Actors Mimic Electronic Frontier Foundation To Attack Gaming Community
Cybersecurity researchers have uncovered a sophisticated campaign targeting the Albion Online gaming community through impersonation of the Electronic Frontier Foundation (EFF).
The operation, discovered in early March 2025, leverages decoy documents designed to appear as...
33.3 Million Cyber Attacks Targeted Mobile Devices In 2024, Keep Your Devices Safe!
A staggering 33.3 million attacks involving malware, adware, and unwanted mobile software were prevented throughout 2024.
This alarming figure translates to an average of 2.8 million attempted attacks per month, highlighting the persistent and evolving...
Routers Under Attack – Attacks Scanning for IoT & Routers at Record High
Vulnerability scanning attacks targeting internet-connected devices have surged dramatically over the past year.
According to recent data compiled by F5 Labs in their February 2025 Sensor Intel Series report, scanning for vulnerabilities increased by a...