Hackers Abuse Windows Container Isolation Framework to Bypass Security Defences
Recently, cybersecurity researchers at Deep Instinct have asserted that hackers can exploit the Windows container isolation framework to bypass the security defenses and mechanisms of organizations.
Containers revolutionize the way applications are packaged and isolated,...
Loda Malware Attack Windows To Control RDP, Spread Malware, And Log User Inputs
Threat actors have been actively employing Loda, a remote access trojan (RAT) developed in AutoIT, an accessible language for automating Windows computer scripting.
The malware may deliver various harmful payloads in addition to keylogging, taking...
OriginBotnet Attack Windows Machine Using Weaponized Word Document
A recent cyberattack effort was discovered that used a malicious Word document delivered via phishing emails, causing victims to download a loader that launched a succession of malware payloads.
OriginBotnet, RedLine Clipper, and Agent Tesla...
APT36 Using Customized Malware to Attack Indian Government Linux and Windows Servers
APT36 is a highly sophisticated APT (Advanced Persistent Threat) group that is known for conducting targeted espionage in South Asia and is strongly linked to Pakistan.
While this APT group is known for targeting the...
Iranian Crambus Actors Modify Windows Firewall Rules To Enable Remote Access
The Crambus espionage group, formally known as OilRig or APT34, has a lengthy history and a great deal of experience conducting prolonged attacks against Iranian targets.
The Iranian-linked attackers targeted a Middle Eastern government between February...
New ExelaStealer Attack Windows PCs and Steals Private Data
A new InfoStealer called ExelaStealer emerged in 2023, joining the ranks of other well-known malware like RedLine, Raccoon, and Vidar.
FortiGuard Labs, a leading cybersecurity research and analysis firm, has revealed some insights into this...