U.S. Organization In China Attacked By China-Based Hackers
A large U.S. organization with significant operations in China fell victim to a sophisticated cyber attack, likely orchestrated by China-based hackers.
The intrusion, which lasted for four months from April to August 2024, allowed the...
Authorities Dismantled 50+ Servers Used By Criminal Marketplace
Europol has recently announced the successful takedown of a sophisticated online fraud network.
The operation, spearheaded by German authorities and supported by law enforcement agencies across Europe, resulted in the seizure of over 50 servers...
New Red Teamers Tool to Execute System Commands Via Microsoft Teams
A groundbreaking tool has emerged in the realm of red teaming, offering a sophisticated method to execute system commands on compromised hosts through Microsoft Teams.
This innovative Command and Control (C2) infrastructure, known as convoC2,...
FBI Warns Of GenAI Abused Create Sophisticated Social Engineering Attacks
The Federal Bureau of Investigation (FBI) has issued a stark warning about the escalating use of GenAI (Generative AI) by criminals to perpetrate large-scale fraud with unusual credibility.
This alarming trend marks a significant shift...
OpenWrt Vulnerability Let Attackers Inject Malicious Firmware Images
A critical vulnerability in OpenWrt's firmware upgrade system has been recently unveieled by the security researcher RyotaK from Flatt Security Inc..
The exploit, which combines a truncated SHA-256 collision with a command injection technique, could...
Top 6 Ways To Back Your Business Up With Cyber Threat Intelligence
Threat intelligence is a cornerstone of a reliable cybersecurity framework. It implies gathering information about сyber threats, analyzing them, and making data-based decisions that ensure the sustainability of your business.
This work is important...
B1ack’s Stash MarketPlace Actors to Release 4 Million Stolen Credit Card Details for Free
Dark web carding marketplace B1ack's Stash has announced the release of 4 million stolen credit card details at no cost to cybercriminals.
This massive data leak, publicized on February 19, 2025, represents one of the...
Hackers Abuse COM Objects for Fileless Malware Lateral Movements
A sophisticated technique was recently detected by researchers where attackers abuse Component Object Model (COM) objects to execute fileless malware for lateral movement across networks.
This technique, detailed in research from March 2025, leverages legitimate...
Threat Actors Using Powerful Cybercriminal Weapon ‘Atlantis AIO’ to Automate Credential Stuffing Attacks
Credential stuffing has emerged as one of the most pervasive and effective attack vectors in today's cybersecurity landscape.
This technique, which leverages stolen username and password combinations across multiple platforms, has been significantly enhanced through...
Classiscam Actors Automate Malicious Websites To Steal Financial Data
Online marketplaces have become increasingly popular in developing countries since 2015, providing platforms for trading various goods from used electronics to brand-new items.
This digitalization trend, however, has created fertile ground for sophisticated scam operations.
Among...