SIEM as a Service

Cloud Attacks Raises by Five Times Attacking Sensitive IAM Service Accounts

Organizations are facing an unbelievable surge in cloud-based security threats, with attacks nearly five times more frequent at the end of 2024 compared to the beginning of the year. Most concerning is the targeted attack...
US Telecom Companies

Arkana Ransomware Group Claims Compromise of US Telecom Companies

The largest US internet provider, WideOpenWest (WOW!), is allegedly compromised by Arkana Security, a recently discovered ransomware group. The attack, which security researchers trace to an infostealer infection from September 2024, has reportedly compromised over...

New Sophisticated Malware CoffeeLoader Bypasses Endpoint Security to Deploy Rhadamanthys Shellcode

Cybersecurity researchers have uncovered a sophisticated new malware strain targeting macOS systems, dubbed "CoffeeLoader," which employs advanced techniques to bypass endpoint security solutions and deliver Rhadamanthys shellcode payloads. The malware represents a significant evolution in...

New macOS Malware ‘ReaderUpdate’ Upgraded Arsenal With Nim and Rust Variants

A sophisticated macOS malware loader platform known as "ReaderUpdate" has significantly evolved its capabilities, with researchers identifying new variants written in Nim and Rust programming languages. Despite being active since at least 2020, this threat...

Classiscam Actors Automate Malicious Websites To Steal Financial Data

Online marketplaces have become increasingly popular in developing countries since 2015, providing platforms for trading various goods from used electronics to brand-new items. This digitalization trend, however, has created fertile ground for sophisticated scam operations. Among...

Threat Actors Using Powerful Cybercriminal Weapon ‘Atlantis AIO’ to Automate Credential Stuffing Attacks

Credential stuffing has emerged as one of the most pervasive and effective attack vectors in today's cybersecurity landscape. This technique, which leverages stolen username and password combinations across multiple platforms, has been significantly enhanced through...

Hackers Abuse COM Objects for Fileless Malware Lateral Movements

A sophisticated technique was recently detected by researchers where attackers abuse Component Object Model (COM) objects to execute fileless malware for lateral movement across networks. This technique, detailed in research from March 2025, leverages legitimate...

B1ack’s Stash MarketPlace Actors to Release 4 Million Stolen Credit Card Details for Free

Dark web carding marketplace B1ack's Stash has announced the release of 4 million stolen credit card details at no cost to cybercriminals. This massive data leak, publicized on February 19, 2025, represents one of the...

SectopRAT as Weaponized Cloudflare Turnstile Challenge Attacks Windows Users

A sophisticated new malware strain dubbed SectopRAT has emerged, leveraging Cloudflare's Turnstile challenge system as part of its attack methodology. This Remote Access Trojan specifically targets Windows users through a multi-staged infection process that begins...

YouTube Creators Under Attack via Brand Collaborators Requests Using Clickflix Technique

A sophisticated phishing campaign dubbed the "Clickflix Technique" has emerged targeting YouTube content creators through seemingly legitimate brand collaboration requests. This new attack vector exploits creators' eagerness to secure sponsorship deals by disguising malware payloads...
SIEM as a Service

Recent Posts

New Malware Hijacking Docker Images

New Malware Hijacking Docker Images with Unique Obfuscation Technique

A newly discovered malware campaign is targeting Docker environments, employing a sophisticated, multi-layered obfuscation technique to evade detection and hijack compute resources for cryptojacking. Security...