Threats

Cyberattacks on User Logins Soar 156% as Infostealers and Phishing Kits Drive Surge

The cybersecurity threat landscape has undergone a dramatic transformation, with identity-based attacks now dominating as the primary vector for cybercriminals.According to recent threat...

Threat Actors Exploit AV/EDR Evasion Framework to Deploy Malware in the Wild

Elastic Security Labs has identified multiple financially motivated malware campaigns leveraging the commercial AV/EDR evasion framework, SHELLTER.Originally designed as a legitimate tool for sanctioned...

FUNNULL Threat Actors Leverage Amazon and Microsoft Cloud Services to Obscure Attack Infrastructure

A new report from Silent Push Threat Analysts has revealed that numerous Western companies, including tech giants like Amazon, Microsoft, and Meta, may still...

TGR-CRI-0045 Threat Actors Exploit IIS Machine Key Compromise to Breach Organizations

Unit 42 researchers have uncovered a sophisticated campaign led by an initial access broker (IAB) exploiting leaked Machine Keys—critical cryptographic keys used on ASP.NET...

XwormRAT Operators Hide Malicious Code Within Legitimate Software for Stealthier Attacks

Security researchers at AhnLab Security Intelligence Center (ASEC) have identified a sophisticated malware campaign utilizing steganography techniques to distribute XwormRAT, a remote access trojan...

Popular

Subscribe

spot_imgspot_img