Cyber Attack

CrazyHunter Hackers Leverage GitHub Open-Source Tools to Launch Attacks on Organizations

The cybercriminal group known as CrazyHunter has rapidly escalated as a formidable ransomware threat, focusing predominantly on organizations in Taiwan’s healthcare, education, and industrial...

Ransomware Attacks Skyrocket 126% Against Consumer Goods and Services Companies

The first quarter of 2025 has seen an unprecedented escalation in cyber threats, with ransomware attacks spiking by 126% compared to the same period...

Cascading Shadows: Threat Actors Use Stealthy Attack Chain to Bypass Detection and Thwart Analysis

Cybersecurity researchers uncovered a sophisticated attack chain employed by threat actors to distribute infostealers such as Agent Tesla, Remcos RAT, and XLoader. This campaign...

LummaStealer Abuses Windows Tool to Execute Remote Code Masquerading as .mp4 File

The Cybereason GSOC team have uncovered a sophisticated attack campaign leveraging the LummaStealer malware, now abusing the legitimate Windows utility mshta.exe to execute remote...

Agent Tesla Deploys Multi-Stage PowerShell Attack Chain

Security researchers at Palo Alto Networks have identified and analyzed an ongoing wave of malspam campaigns employing Agent Tesla, a notorious information-stealing Trojan, as...

Popular

Subscribe

spot_imgspot_img