Latest Articles
Tropic Trooper Hacks Government Agencies, Steals Sensitive Data
Tropic Trooper, a known APT group, has expanded its targeting to a government entity in the Middle East in 2024 by utilizing a new...
ToneShell: The Backdoor Exploiting RDP Certificates to Target VIPs
The ToneShell backdoor, a cyber espionage tool associated with the Mustang Panda threat group, has been used to target attendees of the 2024 IISS...
RAMBO: The New Cyber Attack That Hijacks Data from Air-Gapped Systems
Researchers demonstrate a novel attack on air-gapped systems, as malware on a compromised computer can generate radio signals from its RAM, encoding sensitive information....
NoiseAttack: The Backdoor Using Power Spectral Density for Stealthy Evasion
The research proposes NoiseAttack, a novel backdoor attack for image classification that utilizes the power spectral density (PSD) of White Gaussian Noise (WGN) to...
Mallox Ransomware Advertised on Dark Web Forums To Join its Team
Mallox, a ransomware-as-a-service (RaaS) operation, began its activities in early 2021. Initially, it employed a highly customized approach, targeting specific victims with unique encryption...
Revival Hijacking: Exploiting PyPI Packages in the Wild
The "Revival Hijack" technique exploits a vulnerability in PyPI's package removal process. When a popular package is deleted, its name becomes immediately available for...
Two in One Malware “Luxy” Steal Your Data & Encrypt Files
Luxy is a hybrid threat functioning as both a stealer and a ransomware. Using .NET, the malware consists of three primary modules: BlockAvSites, Stealer,...
Lazarus Hackers Lure Job Seekers with JavaScript Malware
The Lazarus Group's ongoing cyber campaign has seen a surge in activity this year, with the BeaverTail malware playing a central role, which has...
Web3 Surge: New Openings for Cyber Attacks on the Financial Sector
The rapid growth of Web3 has created new opportunities for cybercriminals, especially in decentralized finance (DeFi). North Korea's APT38 has been a prominent actor...
YubiKey Flaw Exposed: Hackers Can Clone Your Device by Extracting Secret Keys
A critical vulnerability has been identified in Infineon's cryptographic library, which is used in YubiKey 5 Series, Security Key Series, and YubiHSM 2 devices...