Latest Articles

Discord RAT

Python-Powered Discord RAT Emerges to Steal User Credentials

A new Python-based Remote Access Trojan (RAT) leveraging Discord’s API for command-and-control (C2) operations has been identified, posing significant risks to users of the...
PJobRAT Android Malware

PJobRAT Android Malware Disguised as Dating and Messaging Apps Targets Military Personnel

Sophos X-Ops researchers have uncovered a new campaign involving PJobRAT, an Android Remote Access Trojan (RAT) first observed in 2019. This latest iteration, which...
Ukrainian Defense Intelligence

Russian Hackers Pose as CIA to Exfiltrate Ukrainian Defense Intelligence

A complex phishing operation, likely orchestrated by Russian intelligence services, has been uncovered by cybersecurity researchers at Silent Push. The campaign, which began in...
Solar Inverters

46 New Vulnerabilities in Solar Inverters Let Attackers Manipulate Settings

Recent research by Forescout Technologies has revealed 46 new vulnerabilities in solar power systems, particularly affecting three prominent manufacturers: Sungrow, Growatt, and SMA. This...
Deep Learning Systems

DeBackdoor: Framework for Identifying Backdoor Attacks in Deep Learning Systems

Recent advancements in deep learning have significantly enhanced the performance of various applications, yet they have also rendered these systems vulnerable to sophisticated attacks,...
Red Team Operations

AI Advancements Fuel Increasing Sophistication in Red Team Operations

A recent scoping review has revealed that artificial intelligence (AI) is revolutionizing red team operations, enabling more sophisticated and automated cyberattacks. The study, which...
DNS MX Records

Hackers Use DNS MX Records to Generate Fake Login Pages for Over 100+ Brands

A sophisticated phishing-as-a-service (PhaaS) platform, dubbed "Morphing Meerkat" by researchers, has been discovered leveraging DNS mail exchange (MX) records to dynamically serve fake login...
SHELBY Malware

SHELBY Malware Uses GitHub for Command-and-Control to Steal Data

Elastic Security Labs has uncovered a sophisticated malware family dubbed SHELBY that leverages GitHub repositories for command-and-control (C2) operations. The malware, consisting of two...
MailChimp Email

Hackers Leverage MailChimp Email Marketing Platform for Phishing Attacks Through Social Engineering

Recent investigations have revealed a troubling surge in cyberattacks targeting MailChimp, a prominent email marketing platform. These attacks, primarily executed through account takeover (ATO),...
Chinese Gambling Sites

Hackers Breach 150,000 Websites to Drive Traffic to Chinese Gambling Sites

A large-scale cyber campaign has compromised over 150,000 legitimate websites by injecting malicious JavaScript to redirect visitors to Chinese-language gambling platforms. The attack, first...

Cyber Security Headlines

Cyber Attacks

AI Advancements Fuel Increasing Sophistication in Red Team Operations

A recent scoping review has revealed that artificial intelligence (AI) is revolutionizing red team operations, enabling more sophisticated...

Hackers Leverage MailChimp Email Marketing Platform for Phishing Attacks Through Social Engineering

Recent investigations have revealed a troubling surge in cyberattacks targeting MailChimp, a prominent email marketing platform. These attacks,...

Data Breach

Hackers Breach 150,000 Websites to Drive Traffic to Chinese Gambling Sites

A large-scale cyber campaign has compromised over 150,000 legitimate websites by injecting malicious JavaScript to redirect visitors to Chinese-language gambling platforms. The...

Cyber AI

New AI-Powered Mirai Botnet Unleashes Unstoppable Large-Scale DDoS Attacks

The Mirai botnet is actively exploiting known web vulnerabilities to compromise over 1,200 sites across 780 customer accounts, as researchers have identified...