Latest Articles

Tropic Trooper Hacks Government Agencies, Steals Sensitive Data

Tropic Trooper Hacks Government Agencies, Steals Sensitive Data

Tropic Trooper, a known APT group, has expanded its targeting to a government entity in the Middle East in 2024 by utilizing a new...
ToneShell: The Backdoor Exploiting RDP Certificates to Target VIPs

ToneShell: The Backdoor Exploiting RDP Certificates to Target VIPs

The ToneShell backdoor, a cyber espionage tool associated with the Mustang Panda threat group, has been used to target attendees of the 2024 IISS...
RAMBO: The New Cyber Attack That Hijacks Data from Air-Gapped Systems

RAMBO: The New Cyber Attack That Hijacks Data from Air-Gapped Systems

Researchers demonstrate a novel attack on air-gapped systems, as malware on a compromised computer can generate radio signals from its RAM, encoding sensitive information....
NoiseAttack: The Backdoor Using Power Spectral Density for Stealthy Evasion

NoiseAttack: The Backdoor Using Power Spectral Density for Stealthy Evasion

The research proposes NoiseAttack, a novel backdoor attack for image classification that utilizes the power spectral density (PSD) of White Gaussian Noise (WGN) to...
Mallox Ransomware Advertised on Dark Web Forums To Join its Team

Mallox Ransomware Advertised on Dark Web Forums To Join its Team

Mallox, a ransomware-as-a-service (RaaS) operation, began its activities in early 2021. Initially, it employed a highly customized approach, targeting specific victims with unique encryption...
Revival Hijacking: Exploiting PyPI Packages in the Wild

Revival Hijacking: Exploiting PyPI Packages in the Wild

The "Revival Hijack" technique exploits a vulnerability in PyPI's package removal process. When a popular package is deleted, its name becomes immediately available for...
Two in One Malware "Luxy" Steal Your Data & Encrypt Files

Two in One Malware “Luxy” Steal Your Data & Encrypt Files

Luxy is a hybrid threat functioning as both a stealer and a ransomware. Using .NET, the malware consists of three primary modules: BlockAvSites, Stealer,...
Lazarus Hackers Lure Job Seekers with JavaScript Malware

Lazarus Hackers Lure Job Seekers with JavaScript Malware

The Lazarus Group's ongoing cyber campaign has seen a surge in activity this year, with the BeaverTail malware playing a central role, which has...
Web3 Surge: New Openings for Cyber Attacks on the Financial Sector

Web3 Surge: New Openings for Cyber Attacks on the Financial Sector

The rapid growth of Web3 has created new opportunities for cybercriminals, especially in decentralized finance (DeFi). North Korea's APT38 has been a prominent actor...
YubiKey Flaw Exposed: Hackers Can Clone Your Device by Extracting Secret Keys

YubiKey Flaw Exposed: Hackers Can Clone Your Device by Extracting Secret Keys

A critical vulnerability has been identified in Infineon's cryptographic library, which is used in YubiKey 5 Series, Security Key Series, and YubiHSM 2 devices...

Cyber Security Headlines

Cyber Attacks

ToneShell: The Backdoor Exploiting RDP Certificates to Target VIPs

The ToneShell backdoor, a cyber espionage tool associated with the Mustang Panda threat group, has been used to...

RAMBO: The New Cyber Attack That Hijacks Data from Air-Gapped Systems

Researchers demonstrate a novel attack on air-gapped systems, as malware on a compromised computer can generate radio signals...

Data Breach

Cyber AI

New AI-Powered Mirai Botnet Unleashes Unstoppable Large-Scale DDoS Attacks

The Mirai botnet is actively exploiting known web vulnerabilities to compromise over 1,200 sites across 780 customer accounts, as researchers have identified...