Kaaviya

603 POSTS
Kaaviya is a Security Editor and fellow reporter with Cyber Press. She is covering various cyber security incidents happening in the Cyber Space.

Exclusive articles:

XwormRAT Operators Hide Malicious Code Within Legitimate Software for Stealthier Attacks

Security researchers at AhnLab Security Intelligence Center (ASEC) have identified a sophisticated malware campaign utilizing steganography techniques to distribute XwormRAT, a remote access trojan...

Anatsa Android Banking Trojan Spreads Through Google Play, Hits U.S. and Canadian Users

ThreatFabric researchers have uncovered a sophisticated new campaign involving the Anatsa Android banking trojan, marking a significant escalation in cybercriminal activities targeting mobile banking...

Abuse of Microsoft 365 Direct Send to Send Phishing Emails Impersonating Internal Users

A recent investigation by Varonis’ Managed Data Detection and Response (MDDR) Forensics team has revealed a sophisticated phishing campaign targeting over 70 organizations by...

Threat Actors Use Clickfix Tactics to Deploy Malicious AppleScripts for Stealing Login Credentials

The CYFIRMA research team has identified a sophisticated cybercrime campaign leveraging Clickfix tactics to deliver malicious AppleScripts (osascripts) aimed at macOS users. The operation, attributed...

Threat Actors Evolve GIFTEDCROOK Stealer into an Advanced Intelligence-Gathering Tool

The cyber-espionage landscape in Eastern Europe has witnessed a significant escalation with the rapid evolution of the GIFTEDCROOK infostealer, attributed to the threat group...

Breaking

Qilin Dominates Attacks Targeting Unpatched Fortinet Flaws

The global ransomware landscape evolved with a surge of...

Arkana Ransomware Group Alleges Breach of 2.2 Million Customer Records

The launch of the Arkana ransomware organization in early...

Apache HTTP Server 2.4.64 Update Patches Eight Security Vulnerabilities

Apache Software Foundation released Apache HTTP Server 2.4.64 on...

AWS Organizations Policy Misconfiguration Let Hackers Gain Full Control of Cloud Environment

A severe weakness in AWS Organizations' delegation procedures was...
spot_imgspot_img