Latest Articles
Python-Powered Discord RAT Emerges to Steal User Credentials
A new Python-based Remote Access Trojan (RAT) leveraging Discord’s API for command-and-control (C2) operations has been identified, posing significant risks to users of the...
PJobRAT Android Malware Disguised as Dating and Messaging Apps Targets Military Personnel
Sophos X-Ops researchers have uncovered a new campaign involving PJobRAT, an Android Remote Access Trojan (RAT) first observed in 2019.
This latest iteration, which...
Russian Hackers Pose as CIA to Exfiltrate Ukrainian Defense Intelligence
A complex phishing operation, likely orchestrated by Russian intelligence services, has been uncovered by cybersecurity researchers at Silent Push.
The campaign, which began in...
46 New Vulnerabilities in Solar Inverters Let Attackers Manipulate Settings
Recent research by Forescout Technologies has revealed 46 new vulnerabilities in solar power systems, particularly affecting three prominent manufacturers: Sungrow, Growatt, and SMA.
This...
DeBackdoor: Framework for Identifying Backdoor Attacks in Deep Learning Systems
Recent advancements in deep learning have significantly enhanced the performance of various applications, yet they have also rendered these systems vulnerable to sophisticated attacks,...
AI Advancements Fuel Increasing Sophistication in Red Team Operations
A recent scoping review has revealed that artificial intelligence (AI) is revolutionizing red team operations, enabling more sophisticated and automated cyberattacks.
The study, which...
Hackers Use DNS MX Records to Generate Fake Login Pages for Over 100+ Brands
A sophisticated phishing-as-a-service (PhaaS) platform, dubbed "Morphing Meerkat" by researchers, has been discovered leveraging DNS mail exchange (MX) records to dynamically serve fake login...
SHELBY Malware Uses GitHub for Command-and-Control to Steal Data
Elastic Security Labs has uncovered a sophisticated malware family dubbed SHELBY that leverages GitHub repositories for command-and-control (C2) operations.
The malware, consisting of two...
Hackers Leverage MailChimp Email Marketing Platform for Phishing Attacks Through Social Engineering
Recent investigations have revealed a troubling surge in cyberattacks targeting MailChimp, a prominent email marketing platform.
These attacks, primarily executed through account takeover (ATO),...
Hackers Breach 150,000 Websites to Drive Traffic to Chinese Gambling Sites
A large-scale cyber campaign has compromised over 150,000 legitimate websites by injecting malicious JavaScript to redirect visitors to Chinese-language gambling platforms.
The attack, first...