SIEM as a Service

CAPE from Cuckoo v1 – Malware Sandbox to Execute Malicious Files in An Isolated...

In the ever-evolving landscape of cyber threats, security professionals need robust tools to analyze malicious software safely. CAPE (Config And Payload Extraction) has emerged as a powerful malware sandbox derived from Cuckoo v1, offering advanced...

Multistage Info Stealer SnakeKeylogger Attacking Individuals and Businesses to Steal Logins

SnakeKeylogger has emerged as a sophisticated credential-stealing malware, targeting both individuals and organizations with its multi-stage infection chain and stealthy in-memory execution techniques. This malware is specifically designed to harvest sensitive login credentials while remaining...

New Malware Attacking Android Users Abusing Cross-Platform Framework For Evasion

Cybercriminals have developed sophisticated malware campaigns targeting Android users by exploiting .NET MAUI, a cross-platform development framework, to evade traditional security measures. These threats disguise themselves as legitimate banking and social networking applications to harvest...

Rilide Malware as Browser Extension Attacking Chrome & Edge Users to Steal Login Credentials

A sophisticated malware strain dubbed "Rilide" has emerged as a significant threat to Chrome and Edge browser users, operating as a deceptive browser extension designed to harvest login credentials. Security researchers have discovered this malware...

New Phishing Attack Using Browser-In-The-Browser Technique To Attack Gamers

A sophisticated new phishing campaign has emerged targeting the gaming community, specifically Counter-Strike 2 players, using an advanced technique known as Browser-in-the-Browser (BitB). This attack method creates a convincing fake browser pop-up window that tricks...

Developers Beware! Fake Coding Challenges Will Deploy FogDoor on Your System

A sophisticated malware campaign targeting software developers has emerged, leveraging fake coding challenges to infiltrate systems with a stealthy backdoor dubbed FogDoor. First identified in March 2025, this threat specifically targets Polish-speaking developers and job...

Hackers Using Fake Semrush Ads to Steal Google Accounts Login Credentials

A sophisticated phishing campaign targeting Google account credentials through fake Semrush advertisements has emerged, posing a significant threat to digital marketers and SEO professionals. Cybercriminals have deployed numerous malicious advertisements that appear legitimate in Google...

Pocket Card Users Under Attack Via Sophisticated Phishing Campaign

A highly targeted phishing campaign is currently exploiting Pocket Card users through elaborately crafted emails that appear to originate from the legitimate financial service provider. The campaign, active since early March 2025, has already compromised...

Operation Red Card – 300+ Cyber Criminals Arrested Linking to Multiple Hacking Activities

INTERPOL led a multi-national law enforcement operation dubbed "Operation Red Card," which has resulted in the arrest of over 300 suspected cyber criminals.  Operation Red Card, conducted from November 2024 to February 2025, targeted cross-border...

New Linux Kernel Rust Module Unveiled to Detect Rootkits

A groundbreaking security tool has emerged in the ongoing battle against sophisticated Linux malware. A new Rust-based kernel module designed specifically for detecting rootkits has been released, offering enhanced capabilities to identify these particularly elusive...
SIEM as a Service

Recent Posts

New Malware Hijacking Docker Images

New Malware Hijacking Docker Images with Unique Obfuscation Technique

A newly discovered malware campaign is targeting Docker environments, employing a sophisticated, multi-layered obfuscation technique to evade detection and hijack compute resources for cryptojacking. Security...