Hacks

APT35 Hackers Threaten Government and Military Organizations by Stealing Login Credentials

The Stormshield CTI team identified two active servers closely resembling those documented by Check Point in their recent APT35 report. Both servers host an...

Hackers Using Weaponized Microsoft Teams Installer to Compromise Systems With Oyster Malware

On September 25, 2025, Conscia’s Managed Detection and Response team identified a sophisticated malvertising campaign that attempted to compromise enterprise endpoints by distributing a...

Hackers Use SVG Files to Deploy PureMiner Malware and Steal Sensitive Information

Cybercriminals exploit malicious SVG files in phishing campaigns targeting Ukrainian organizations, deploying Amatera Stealer and PureMiner malware through sophisticated attack chains. FortiGuard Labs has uncovered...

Hackers Exploit 26 Code-Signing Certificates to Push Fake AppSuite-PDF and PDF Editor Software

Cybersecurity researchers have uncovered a large-scale malware campaign abusing at least 26 code-signing certificates over the past seven years to disguise malicious software as...

Sidewinder Hacker Group Exploits LNK Files to Deploy Malicious Scripts

In a new wave of espionage activity, APT-C-24, also known as Sidewinder or Rattlesnake, has shifted tactics to leverage Windows shortcut (.LNK) files for...

Popular

Subscribe

spot_imgspot_img