SIEM as a Service

Malware Attack News

Our Malware Attack News category keeps you informed about the latest threats affecting systems worldwide. From ransomware outbreaks to spyware and trojans, we provide up-to-the-minute updates on malware trends and their impact on businesses and individuals.

Our expert insights help you understand how these attacks happen and what steps to take to protect your data. Get detailed analyses of high-profile malware campaigns, emerging vulnerabilities, and cybersecurity defenses.

Hackers Attacking Employees With Weaponized Google Drive Links To Deliver Malware

Hackers Weaponize Google Drive Links to Breach Corporate Networks

A sophisticated attack campaign targeting organizations in Japan and other East Asian countries. The threat actor, identified as APT-C-60, is employing a clever social engineering tactic that exploits job application processes to infiltrate corporate...
Radiant Hacked

Radiant Hacked – $50 Million USD Worth Crypto Stolen by North Korean Hackers

Radiant Capital, a prominent decentralized finance (DeFi) protocol, has fallen victim to a major security breach, resulting in the loss of approximately $50 million USD. The attack, which exploited vulnerabilities in the devices of...
MediaTek Bluetooth Chipset Vulnerabilities

Critical MediaTek Bluetooth Chipset Vulnerabilities Impacted 1.5 Billion+ Android Users

A series of security vulnerabilities have been identified in MediaTek chipsets, affecting several Android versions and other related software platforms. MediaTek leads the market in powering Android tablets and smart-feature phones and ranks as...
North Korean Hacking Group Launches Undected Malwareless URL Phishing Attacks

North Korean Hacking Group Launches Undected Malwareless URL Phishing Attacks

Researchers from South Korea have discovered that the notorious North Korean hacking group, known as Kimsuky, has adapted its phishing tactics to use malwareless phishing attack tactics, which evade major EDR detection. The group, which...
Rockstar 2FA

“Rockstar 2FA” Phishing-as-a-Service Steals Microsoft 365 Credentials Via AiTM Attacks

Cybersecurity researchers have identified a concerning link between the advanced phishing toolkit known as 'Rockstar 2FA' and a surge in adversary-in-the-middle (AiTM) phishing attacks. Highly advanced methods are used in these campaigns to trick people...
GPU DDK Vulnerabilities

Critical GPU DDK Vulnerabilities Allow Attackers to Execute Arbitrary Code in Physical Memory

A significant development for the tech community is the identification of 2 critical vulnerabilities in several versions of a widely-used GPU Driver Development Kit (DDK) that affect systems using Unified Memory Architecture (UMA). On...
North Korean Hackers Attacking Developers With A Weaponized JavaScript Projects

North Korean Hackers Attacking Developers With A Weaponized JavaScript Projects

North Korean threat actors target software developers with weaponized Javascript projects that include BeaverTail malware deployed via NPM packages. It is intended to steal information and load additional stages of malware, notably a multi-stage Python-based...
Teaching AI to Hack

Teaching AI to Hack: Researchers Demonstrate ChatGPT’s to Ethically Hack Linux & Windows

In a new study released today, researchers have demonstrated the significant potential of artificial intelligence (AI) in enhancing ethical hacking practices, particularly in Linux environments. The study, conducted by Haitham S. Al-Sinani from the...
Exploits Corrupted Files

Hackers Launch Zero-Day Attacks to Exploits Corrupted Files to Evade Security Tools

Cybersecurity experts at ANY.RUN have uncovered an active zero-day attack campaign that leverages corrupted files to bypass antivirus software, sandbox environments, and even email spam filters. The attack, first identified by the ANY.RUN team, poses...
SIEM as a Service

Recent Posts