EHA
TA571 Hacker Group Deliver IcedID Malware Via Password-protected Zip Archive

TA571 Hacker Group Deliver IcedID Malware Via Password-protected Zip Archive

Hackers often use password-protected Zip Archive files for malware distribution to evade detection by security software.  They let the malware infiltrate the target system without detection by encrypting the file, which makes it more difficult...
Hacker from ShinyHunters Group Arrested for Breaching 60+ Organizations

22-yr Old Hacker from ShinyHunters Group Arrested for Hacking 60+ Organizations

A 22-year-old French citizen, Sebastian Raoult, has been sentenced to three years in prison and ordered to pay over $5 million in restitution for his role in a sprawling cybercrime ring that hacked and...
Microsoft Disabled App Installer that Abused by Hackers to Install Malware

Microsoft Disabled App Installer that Abused by Hackers to Install Malware

Threat actors, particularly those with financial motivations, have been observed spreading malware via the ms-appinstaller URI scheme (App Installer). As a result of this activity, Microsoft has disabled the ms-appinstaller protocol handler by default. “The...
Hackers’ Leaksmas Darkweb Event Exposes Massive Hacked Data

Hackers’ Leaksmas Darkweb Event Exposes Massive Hacked Data

As carols resonated in the air and families convened, the cyber underworld ushered in a chilling twist to Christmas – 'Leaksmas,' a season marked by rampant data dumps targeting individuals and organizations worldwide.  Resecurity, a...
MongoDB Suffers Security Breach, Exposing Customer Data

MongoDB Cyber Attack, Customer Data Exposed

MongoDB has experienced a security incident in which unauthorized access to its corporate systems was identified. However, the company confirmed that there was no evidence of access to any customer's system logs. MongoDB is...
New Underground Market OLVX Advertising Wide Variety of Hacking Tools 

New Dark Web Market OLVX Advertising Variety of Hacking Tools 

Threat actors exploit underground markets by purchasing or selling stolen data, malware, and hacking tools to facilitate cybercrime.  These underground markets provide the following key facilities among threat actors that fuel the growth of cyber...
Hackers hijacked an Irish water utility and interrupted the Water Supply

Hackers Hijacked Water Facility that Interrupted the Supply

Recently, there was a cyberattack on an Irish water utility that resulted in hackers gaining control of the system and disrupting the water supply. Last week, a private group water system in the Erris...
Return of Genesis Market: Hackers Exploited Node.js and EV code signing

Genesis Market Technique: Hackers Exploited Node.js and EV Certificates

In the labyrinthine landscape of cyber threats, the Trend Micro Managed XDR team has uncovered a malevolent symphony echoing the tactics employed by the infamous Genesis Market.  Trend Micro Managed XDR, or Extended Detection and...
Hackers Exploiting Zimbra 0-day to Attack Government Organizations

Hackers Exploiting Zimbra 0-day to Attack Government Organizations

Zimbra Collaboration is an open-source solution software suite with an email server and web client for collaboration.  Over 5,000 companies and public sector users, along with hundreds of millions of end-users in more than 140...
McLaren Health Care Hacked

McLaren Health Care Hacked: Attackers Claim 6 TB of Patient Data Stolen

In August of this year, McLaren Health Care suffered a cyber attack that resulted in the compromise of 2.2 million individual data records. The attackers claimed to have accessed approximately 6 terabytes of sensitive patient...

Managed WAF

Website

Latest News