SIEM as a Service

New Wave of ‘Scam-Yourself’ Attacks Utilizing AI-Generated Videos With DeepFake

A new wave of "Scam-Yourself" attacks leveraging AI-generated deepfake videos and malicious scripts is targeting cryptocurrency enthusiasts and financial traders, marking a dangerous evolution in social engineering tactics. Discovered by cybersecurity researchers at Gen Digital,...

Weaponized Signal, Line, and Gmail Apps Delivers Malware That Changes System Defenses

A sophisticated cyberattack campaign targeting Chinese-speaking users, malicious actors have weaponized fake versions of popular applications such as Signal, Line, and Gmail. These fake and weaponized apps are distributed via deceptive download pages that deliver...

Highly Obfuscated .NET sectopRAT Mimic as Chrome Extension

The emergence of a highly obfuscated .NET-based Remote Access Trojan (RAT) known as sectopRAT, disguised as a legitimate Google Chrome extension has been revealed in a recent analysis. This malicious software, also identified as Arechclient2,...

Threat Actors Trojanize Popular Versions of Games To Infect Systems Bypassing Evasion Techniques

In a sophisticated cyberattack campaign dubbed "StaryDobry," threat actors have exploited popular games to distribute malicious software, targeting users worldwide. The campaign, first detected on December 31, 2024, leveraged trojanized versions of games such as...

New Research Proposed To Enhance MITRE ATT&CK In Dynamic Cybersecurity Environments

Cybersecurity researchers have proposed groundbreaking enhancements to the MITRE ATT&CK framework, aiming to strengthen its adaptability in dynamic and evolving threat landscapes. As cyber adversaries increasingly exploit emerging technologies like generative AI and industrial control...

Weaponized PDF Documents Deliver Lumma InfoStealer Attacking Educational Institutions

The Lumma InfoStealer malware has been observed leveraging weaponized PDF documents to target educational institutions. This sophisticated campaign exploits malicious LNK (shortcut) files disguised as legitimate PDFs, initiating multi-stage infection processes that compromise sensitive data. Educational...

Hackers Hiding Credit Card Stealer Script Within <img> Tag

Cybercriminals have developed a sophisticated method to steal credit card information by embedding malicious scripts within <img> tags on e-commerce websites. This technique, often associated with MageCart attacks, exploits the trustworthiness of image tags to...

Earth Preta Abuse Microsoft Application Virtualization Injector To Inject Malicious Payloads

Advanced Persistent Threat (APT) group Earth Preta (a.k.a. Mustang Panda) has been observed weaponizing the Microsoft Application Virtualization Injector (MAVInject.exe) to bypass security software and implant backdoors in government systems across Asia-Pacific regions. The campaign,...

EagerBee Malware Attacking Government Entities & ISPs To Deploy Backdoor

A sophisticated malware framework dubbed EagerBee is actively targeting government agencies and Internet Service Providers (ISPs). EagerBee is actively targeting these organizations across the Middle East. While the EagerBee was found deploying advanced backdoor capabilities through...

DarkMind A Novel Backdoor Attack Exploits Reasoning Capabilities of Customized LLMs

A groundbreaking study by researchers Zhen Guo and Reza Tourani at Saint Louis University has exposed a novel vulnerability in customized large language models (LLMs) like GPT-4o and LLaMA-3. Dubbed DarkMind, this backdoor attack exploits...
SIEM as a Service

Recent Posts

Third-Party Vendor Risks

Assessing Third-Party Vendor Risks – CISO Best Practices

Third-party vendors are indispensable to modern enterprises, offering specialized services, cost efficiencies, and scalability. However, they also introduce significant cybersecurity risks that can compromise...