Cyber Attack

Cascading Shadows: Threat Actors Use Stealthy Attack Chain to Bypass Detection and Thwart Analysis

Cybersecurity researchers uncovered a sophisticated attack chain employed by threat actors to distribute infostealers such as Agent Tesla, Remcos RAT, and XLoader. This campaign...

LummaStealer Abuses Windows Tool to Execute Remote Code Masquerading as .mp4 File

The Cybereason GSOC team have uncovered a sophisticated attack campaign leveraging the LummaStealer malware, now abusing the legitimate Windows utility mshta.exe to execute remote...

Agent Tesla Deploys Multi-Stage PowerShell Attack Chain

Security researchers at Palo Alto Networks have identified and analyzed an ongoing wave of malspam campaigns employing Agent Tesla, a notorious information-stealing Trojan, as...

Setting Up MITRE ATT&CK Use Cases in Your SOC

The MITRE ATT&CK framework represents one of the most valuable resources for modern Security Operations Centers (SOCs), providing a comprehensive knowledge base of adversarial...

Critical Cisco Webex Flaw Allows Code Execution via Malicious Meeting Links

A critical vulnerability (CVE-2025-20236) in Cisco Webex App’s custom URL parser has been patched, addressing a high-severity flaw that allows unauthenticated attackers to execute...

Popular

Subscribe

spot_imgspot_img