EHA
Vigorish Viper, An Advanced Suite That Cybercrime Supply Chain

Vigorish Viper, nn Advanced Suite for Cybercrime Supply Chain

Hackers make use of the cybercrime supply chain for a multitude of illicit purposes like acquiring and distributing malicious tools, services, and stolen data. This collaboration leads them to execute more sophisticated and widespread attacks...
Hackers Bypass SEGs With Sophisticated Malware Exploits

Hackers Bypass Secure Email Gateway With Sophisticated Malware Exploits

Hackers often attack Secure Email Gateways (SEGs) to bypass security measures and gain access to private communications. Once they have attacked SEGs, they can snoop on emails, change them or even start a phishing scheme...
Hackers Allegedly Leaked of CrowdStrike’s Threat Actor Database

Hackers Allegedly Leaked CrowdStrike’s Threat Actor Database

A hacktivist entity known as USDoD has claimed to have leaked CrowdStrike's "entire threat actor list" and alleged possession of the company's "entire IOC list", which contains over 250 million data points. On July...
Beware of New Krampus Loader That Getting Popular in Dark Web

Beware of New Krampus Loader That Getting Popular in Dark Web

A new malware loader named "Krampus" has surfaced on the dark web, gaining rapid popularity among threat actors. The loader was announced on a dark web forum by a threat actor, as reported by...
Russian FrostyGoop Malware Cuts Off Heaters In 600 Apartment Buildings During Zero Temperatures

Russian Malware Cuts Off Heaters In 600 Apartments During Zero Temperatures

FrostyGoop represents a significant advancement in industrial control systems (ICS) malware, being the ninth ICS-specific threat and the first to leverage Modbus TCP communications for directly impacting Operational Technology (OT).  When FrostyGoop uses Modbus for...
Stargazers Ghost

Stargazers Ghost: Network of GitHub Accounts Used to Deliver Malware

Cybersecurity researchers at Check Point have uncovered a sophisticated network of GitHub accounts, dubbed the Stargazers Ghost Network, that has been distributing malware and phishing links since at least June 2023. This network, operated by...
KnowBe4 Hired Fake North Korean IT Worker, Catches While Installing Malware

KnowBe4 Hired Fake North Korean IT Worker, Catches While Installing Malware

Security awareness and training provider KnowBe4 recently disclosed that it inadvertently hired a fake North Korean IT worker who attempted to install malware on a company-issued computer. The incident highlights the growing sophistication of...
R0bl0ch0n Rogue Traffic Distribution System Impacted Over 110 Million Internet Users

R0bl0ch0n Rogue TDS Impacted Over 110 Million Internet Users

Affiliate marketing is a practice where firms compensate associates for bringing visitors or customers to their websites. It comprises sellers, publishers (affiliates), intermediaries, and consumers. Affiliates earn commissions through content creation, direct offer mailing lists,...
Beware Of Braodo Stealer That Steals Users’ Login Credentials

Beware Of Braodo Stealer That Steals Users’ Login Credentials

Stealers are one of the most used malicious tools that is used by threat actors. As such tools enable hackers to obtain sensitive information such as passwords, credit card details, and personal data from...
Patchwork Hackers Upgraded Their Arsenal With Advanced PGoShell

Patchwork Hackers Upgraded Their Arsenal With Advanced PGoShell

Advanced Threat Intelligence Team, Knownsec 404 has recently discovered a potential Bhutan-targeted attack by the Patchwork group that has employed an advanced Go backdoor and the Brute Ratel C4 red team tool for the...

Managed WAF

Website

Latest News