Chinese FishMonger APT Operated by I‑SOON Attacking Government Entities & NGOs
Recent cybersecurity investigations have uncovered a sophisticated threat actor dubbed "FishMonger" operating under the umbrella of I-SOON, a Chinese company with alleged ties to state-sponsored hacking operations.
This Advanced Persistent Threat (APT) group has been...
New Steganographic Malware Exploits JPEG Files to Distribute Infostealers
A sophisticated malware campaign employing steganographic techniques has recently been identified, targeting users through seemingly innocent JPEG image files.
The attack leverages hidden malicious code embedded within image files that, when executed, initiates a complex...
RansomHub Affiliate Deploying New Custom Backdoor Dubbed ‘Betruger’ For Persistence
A RansomHub affiliate has been observed recently deploying a new custom backdoor named 'Betruger'.
This sophisticated malware, discovered on March 20, 2025, by the Symantec Threat Hunter team, represents a concerning evolution in ransomware attack...
North Korean IT Workers Exploiting GitHub to Attack Organizations Worldwide
A sophisticated network of suspected North Korean IT workers has been discovered leveraging GitHub to create false identities and secure remote employment opportunities in Japan and the United States.
These operatives pose as Vietnamese, Japanese,...
Babuk2 Ransomware Issuing Fake Extortion Demands With Data from Old Breaches
The Babuk2 ransomware group has been caught issuing extortion demands based on false claims and recycled data from previous breaches.
This revelation comes from recent investigations conducted by the Halcyon RISE Team, shedding light on...
Zero-Hour Phishing Attacks Exploiting Browser Vulnerabilities Increases by 130%
Recent cybersecurity data reveals an alarming 130% surge in zero-hour phishing attacks targeting previously unknown browser vulnerabilities.
These sophisticated attacks leverage unpatched security flaws in popular browsers to deploy malicious payloads before security teams can...
Dragon RaaS Leading ‘Five Families’ Crimeware With New Initial Access & Exploitation Methods
A sophisticated Ransomware-as-a-Service (RaaS) operation known as 'Dragon' has emerged as the dominant force within the notorious "Five Families" of crimeware, implementing advanced initial access techniques and exploitation methods that have alarmed cybersecurity experts.
The...
Chinese Salt Typhoon Hackers Exploiting Exchange Vulnerabilities to Attack Organizations
Security researchers have identified a sophisticated Chinese APT group known as Salt Typhoon that has been actively exploiting Microsoft Exchange's ProxyLogon vulnerabilities to compromise organizations worldwide.
The group, also tracked as FamousSparrow, GhostEmperor, Earth Estries,...
Signal Messenger Leveraged for Targeted Attacks on Employees of Defense Industry
A sophisticated cyber espionage campaign targeting employees of defense industrial complex enterprises and representatives of the Defense Forces of Ukraine has been uncovered.
The attackers are using the popular Signal messenger app to distribute malicious...
Babuk Ransomware Group Claims Attack on Telecommunication Firm Orange
Babuk, a notorious ransomware group, has claimed responsibility for a significant cyberattack on Orange, one of the world's leading telecommunications companies.
This attack, which was meticulously planned over a long period, resulted in the exfiltration...