SIEM as a Service

Strela Stealer Malware Attacking Microsoft Outlook Users To Steal Login Credentials

Cybersecurity researchers at Trustwave have discovered a sophisticated malware campaign targeting Microsoft Outlook users to steal their login credentials. The Strela Stealer, named after the Russian word for "Arrow," has been actively targeting systems since...
Researchers Decoded Stealthy Memory Malware PEAKLIGHT

Stealthy Memory Malware PEAKLIGHT Attack Windows Using Microsoft Shortcut File (LNK)

Cybersecurity analysts at Mandiant recently identified a stealthy memory malware dubbed "PEAKLIGHT." A Stealth memory malware is often referred to as fileless malware which resides only in a computer's RAM and consequently evades normal antivirus...
Threat Intelligence Feeds

Boost up Your SOC & DFIR Operations with ANY.RUN’s Threat Intelligence Feeds

Effective cyber threat detection and response depend on the ability to access actionable, real-time intelligence. ANY.RUN, a trusted name in interactive malware analysis, offers Threat Intelligence (TI) Feeds Integration that gives SOC (Security Operations...

Weaponized PDF Documents Deliver Lumma InfoStealer Attacking Educational Institutions

The Lumma InfoStealer malware has been observed leveraging weaponized PDF documents to target educational institutions. This sophisticated campaign exploits malicious LNK (shortcut) files disguised as legitimate PDFs, initiating multi-stage infection processes that compromise sensitive data. Educational...
Hackers Modifying Registry Keys and Establishing Persistence via Scheduled Tasks

Hackers Modifying Registry Keys to Establish Persistence via Scheduled Tasks

Persistence is one of the key things for threat actors to maintain their access to compromised systems and establish connections whenever they require. One of the key methods used to maintain persistence is the...

Lazarus Group Using New Malware Tactic To Attack Developers Globally

The notorious Lazarus Group in a recent escalation of cyber threats linked to North Korea, has unveiled a sophisticated new tactic to target developers worldwide. This campaign, dubbed "Operation Marstech Mayhem," involves the deployment of...
Splunk AI Based Honeypot “DECEIVE

Splunk Unveils a New AI Based Honeypot “DECEIVE” to Log Attacker Activities

Splunk, a leader in data analytics and cybersecurity solutions, has introduced a groundbreaking proof-of-concept honeypot system named DECEIVE (DECeption with Evaluative Integrated Validation Engine).  This AI-powered tool is designed to simulate high-interaction systems with minimal...

New PyPI Malware Tricking Developers To Gain Access To Ethereum Wallets

The Socket Research Team has discovered a sophisticated malicious PyPI package named 'set-utils' designed to steal Ethereum private keys from unsuspecting developers. This package, which has been downloaded over 1,000 times since January 29, 2025,...

New Facebook Fake Copyright Notices Phishing Steals Your FB Credentials

A recent phishing campaign has been targeting Facebook users with fake copyright infringement notices, aiming to steal their login credentials. This sophisticated scam has been sent to over 12,279 email addresses, primarily affecting enterprises across...

DarkMind A Novel Backdoor Attack Exploits Reasoning Capabilities of Customized LLMs

A groundbreaking study by researchers Zhen Guo and Reza Tourani at Saint Louis University has exposed a novel vulnerability in customized large language models (LLMs) like GPT-4o and LLaMA-3. Dubbed DarkMind, this backdoor attack exploits...
SIEM as a Service

Recent Posts

SectopRAT as Weaponized Cloudflare Turnstile Challenge Attacks Windows Users

A sophisticated new malware strain dubbed SectopRAT has emerged, leveraging Cloudflare's Turnstile challenge system as part of its attack methodology. This Remote Access Trojan specifically...