EHA
New North Korean Hackers Attack Aerospace and Defense Companies

New North Korean Hackers Attack Aerospace and Defense Companies

Security researchers have uncovered a sophisticated new malware campaign likely linked to North Korean hackers, targeting aerospace and defense companies with a previously undocumented backdoor. Researchers have dubbed the campaign "Niki." It uses job description...
New Linux Variant Of RansomHub Attacking ESXi Systems

New Linux Variant Of RansomHub Attacking ESXi Systems

Hackers often attack ESXi systems, as they are widely used in enterprise environments to manage virtualized infrastructure, making them lucrative targets. Threat actors can exploit security flaws in ESXi to deploy ransomware and perform other...
GoRed Using DNS And ICMP Tunneling For C2 Server Communication

GoRed Using DNS & ICMP Tunneling For C2 Server Communication

Hackers often abuse DNS and ICMP tunneling to transmit data and bypass network security measures covertly. All these protocols, which are often enabled by poorly protected firewalls, can be manipulated to create hidden communication routes...
Chinese Hackers Attacking Telcos Using Espionage Tools to Steal Credentials

Chinese Hackers Attacking Telcos Using Reconnaissance Tools

A long-running espionage campaign by attackers using tools associated with Chinese hacking groups has breached multiple telecom operators in an Asian country since at least 2021, with evidence suggesting activity may date back to...
Hackers Weaponizing Vortex Meeting Software To Attack macOS Users

Hackers Weaponizing Vortax Meeting Software To Attack macOS Users

Threat actors leverage meeting software applications and tools to penetrate weak security loopholes, infiltrate secure settings and organizations, steal highly confidential information, and restrict organizational functions. Recorded Future's Insikt group has recently unveiled a long-term...
Hackers Using Weaponized Word Documents In QR Code Phishing Attacks

Hackers Using Weaponized Word Documents In QR Code Phishing Attacks

Hackers often abuse weaponized Word docs, as they can contain macros that contain or exploit flaws inside those Word files to run destructive code upon being opened by the intended victims. It enables an attacker...
Weaponized Cisco Webex Meetings App

Hackers Using Weaponized Cisco Webex Meetings App To Deliver Malware

A novel information-stealing campaign detailing the attackers' tactics, techniques, and procedures (TTPs) throughout the attack lifecycle, where the Mitre ATT&CK framework is used to classify these TTPs and identify potential detection points.  By examining the...
New ScriptBlock Smuggling Attack Let Ackers Bypass PowerShell Security Logs And AMSI

New ScriptBlock Smuggling Attack Let Ackers Bypass PowerShell Security Logs And AMSI

Ever since the introduction of PowerShell v5, there have been less usage of the application specifically among threat actors, penetration testers and red teamers. This is because PowerShell v5 introduced PowerShell security logging which allows...
New OPIX Ransomware Encrypting Files With Random Character String

New OPIX Ransomware Encrypting Files With Random Character String

A recently identified ransomware variant dubbed OPIX encrypts user files using a random character string and adds the ".OPIX" extension to them.  The ransomware will drop a notice on victims' screens telling them to get...
Malicious Search SolarMarker Malware

Beware Of Malicious Search Results Leading To SolarMarker Malware Installation

The SOC analysts identified a drive-by download attack leveraging SolarMarker malware, where the attack targeted users searching for team-building activities on Bing.  Attackers tricked the victim into downloading a seemingly harmless document by redirecting the...

Managed WAF

Website

Latest News